Power Analysis Attack Against post-SAT Logic Locking schemes - LIRMM - Laboratoire d’Informatique, de Robotique et de Microélectronique de Montpellier Accéder directement au contenu
Communication Dans Un Congrès Année : 2024

Power Analysis Attack Against post-SAT Logic Locking schemes

Résumé

Due to the globalization of the semiconductor industry, Integrated Circuits (ICs) and Intellectual Properties (IPs) are susceptible to specific threats. IP piracy, overproduction, and introduction of hardware Trojans can indeed compromise valuable design information and trust in the design flow. Logic Locking (LL) is one of the most popular Design-for-Trust techniques that aims to thwart these threats because of the wide range of risks it can prevent. This approach evolves from year to year in order to make it resistant to ever more advanced attacks. While most advanced LL solutions are assumed to be resistant against differential power analysis (DPA), we propose a new attack framework for challenging these approaches and show on several benchmarks that it is possible to reveal more than 88% of the key bits used for locking the designs thanks to DPA.
Fichier principal
Vignette du fichier
Power_Analysis_Attack_Against_post-SAT_Logic_Locking_schemes.pdf (1.25 Mo) Télécharger le fichier

Dates et versions

lirmm-04628663 , version 1 (28-06-2024)

Identifiants

Citer

Nassim Riadi, Florent Bruguier, Pascal Benoit, Sophie Dupuis, Marie-Lise Flottes. Power Analysis Attack Against post-SAT Logic Locking schemes. ETS 2024 - 29th IEEE European Test Symposium, May 2024, The Hague, Netherlands. pp.1-6, ⟨10.1109/ETS61313.2024.10567311⟩. ⟨lirmm-04628663⟩
3 Consultations
3 Téléchargements

Altmetric

Partager

Gmail Mastodon Facebook X LinkedIn More