论文标题

Unsail:挫败无甲骨文的机器学习攻击逻辑锁定

UNSAIL: Thwarting Oracle-Less Machine Learning Attacks on Logic Locking

论文作者

Alrahis, Lilas, Patnaik, Satwik, Knechtel, Johann, Saleh, Hani, Mohammad, Baker, Al-Qutayri, Mahmoud, Sinanoglu, Ozgur

论文摘要

逻辑锁定旨在保护整个全球化供应链中集成电路(IC)设计的知识产权(IP)。基于量身定制的机器学习(ML)模型的帆攻击以高精度绕过组合逻辑锁定,并且是最有效的攻击之一,因为它不需要功能性的IC充当甲骨文。在这项工作中,我们提出了Unsail,这是一种逻辑锁定技术,该技术插入了关键门结构,其特定目的是将ML模型混淆,例如SAIL中使用的模型。更具体地说,Unsail可以防止寻求解决合成引起的混淆的结构转换的攻击,这是逻辑锁定的重要步骤。我们的方法是通用的;它可以保护任何钥匙门的本地结构,以免受无甲骨文环境中基于ML的攻击。我们为帆攻击开发了参考实现,并在传统上锁定的锁定设计上启动它。在SAIL中,使用更改预测模型来确定使用重建模型恢复哪些键门结构。我们对从ISCAS-85和ITC-99套件到OpenRISC参考平台系统芯片(ORPSOC)(ORPSOC)的基准测试的研究证实,Unsail降低了变更预测模型的准确性和重建模型的平均20.13和17个百分点(PP)。当将上述型号组合在一起(这是帆的最强大情况)时,Unsail将帆的攻击精度平均降低11pp。我们进一步证明,不详细的避免了其他无甲骨文的攻击,即扫荡和冗余攻击,表明了我们方法的通用性质和力量。详细的布局级别的评估表明,在百万门闸门的Orpesoc设计上,Unsimail的最小面积和功率开销分别为0.26%和0.61%。

Logic locking aims to protect the intellectual property (IP) of integrated circuit (IC) designs throughout the globalized supply chain. The SAIL attack, based on tailored machine learning (ML) models, circumvents combinational logic locking with high accuracy and is amongst the most potent attacks as it does not require a functional IC acting as an oracle. In this work, we propose UNSAIL, a logic locking technique that inserts key-gate structures with the specific aim to confuse ML models like those used in SAIL. More specifically, UNSAIL serves to prevent attacks seeking to resolve the structural transformations of synthesis-induced obfuscation, which is an essential step for logic locking. Our approach is generic; it can protect any local structure of key-gates against such ML-based attacks in an oracle-less setting. We develop a reference implementation for the SAIL attack and launch it on both traditionally locked and UNSAIL-locked designs. In SAIL, a change-prediction model is used to determine which key-gate structures to restore using a reconstruction model. Our study on benchmarks ranging from the ISCAS-85 and ITC-99 suites to the OpenRISC Reference Platform System-on-Chip (ORPSoC) confirms that UNSAIL degrades the accuracy of the change-prediction model and the reconstruction model by an average of 20.13 and 17 percentage points (pp) respectively. When the aforementioned models are combined, which is the most powerful scenario for SAIL, UNSAIL reduces the attack accuracy of SAIL by an average of 11pp. We further demonstrate that UNSAIL thwarts other oracle-less attacks, i.e., SWEEP and the redundancy attack, indicating the generic nature and strength of our approach. Detailed layout-level evaluations illustrate that UNSAIL incurs minimal area and power overheads of 0.26% and 0.61%, respectively, on the million-gate ORPSoC design.

扫码加入交流群

加入微信交流群

微信交流群二维码

扫码加入学术交流群,获取更多资源