Skip to main content

Revisiting Logic Obfuscation Using Cellular Automata

  • Conference paper
  • First Online:
Proceedings of First Asian Symposium on Cellular Automata Technology (ASCAT 2022)

Abstract

Logic obfuscation has evolved as a promising countermeasure against IP piracy. The Finite State Machine (FSM) is often obfuscated in a sequential circuit using suitable strategies. One such strategy proposed to obfuscate each state transition of the FSM using a class of non-group additive cellular automata (CA) called \(D1\,*\,CA\) and \(D1\,*\,CA_{dual}\). This CA-based obfuscation strategy conceals the FSM states, providing high testability hence eliminating the requirement of any scan-based Design-for-Testability techniques. However, utilizing the information leaked by the implemented FSM observable externally, an end-to-end attack strategy (named ORACALL) was proposed. It could extract the secret key for each transition of the CA-based obfuscated FSM along with the CA state encodings of the FSM states. In this work, we investigate the root cause of the success of ORACALL on a CA-based obfuscation strategy. Utilizing those findings, we propose a couple of mitigation techniques by appending non-linearity to the existing CA structure along with a slight modification of the \(D1\,*\,CA\) rule vector. Experimental validation proves that these simple yet effective countermeasures could thwart ORACALL while preserving the elegance of the underlying structure of the CA-based obfuscation technique with minimal overhead.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 149.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 199.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    depth here is the minimum number of state transitions required from an unreachable state to reach the cyclic state

  2. 2.

    Class (a, b, c) infers that the S-Box equation comprises of a cubic terms, b quadratic terms, and c linear terms, respectively.

References

  1. Yasin, M., Sengupta, A., Nabeel, M. T., Ashraf, M., Rajendran, J., Sinanoglu, O.: Provably-secure logic locking: from theory to practice. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp. 1601–1618 (2017)

    Google Scholar 

  2. Roy, J.A., Koushanfar, F., Markov, I.L.: Ending piracy of integrated circuits. Computer 43(10), 30–38 (2010)

    Article  Google Scholar 

  3. Yasin, M., Mazumdar, B., Rajendran, J.J., Sinanoglu, O.: TTLock: Tenacious and traceless logic locking. In: 2017 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), p. 166. IEEE Computer Society (2017)

    Google Scholar 

  4. Alkabani, Y., Koushanfar, F.: Active hardware metering for intellectual property protection and security. In: USENIX Security Symposium, pp. 291–306 (2007)

    Google Scholar 

  5. Kahng, A.B., Lach, J., Mangione-Smith, W.H., Mantik, S., Markov, I.L., Potkonjak, M., ... & Wolfe, G.: Watermarking techniques for intellectual property protection. In: Proceedings of the 35th Annual Design Automation Conference, pp. 776–781 (1998)

    Google Scholar 

  6. Rajendran, J., Sam, M., Sinanoglu, O., Karri, R.: Security analysis of integrated circuit camouflaging. In: Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security, pp. 709–720 (2013)

    Google Scholar 

  7. Subramanyan, P., Ray, S., Malik, S.: Evaluating the security of logic encryption algorithms. In: 2015 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), pp. 137–143. IEEE (2015)

    Google Scholar 

  8. Xie, Y., Srivastava, A.: Anti-sat: mitigating sat attack on logic locking. IEEE Trans. Comput.-Aided Des. Integr. Circ. Syst. 38(2), 199–207 (2018)

    Article  Google Scholar 

  9. Yasin, M., Mazumdar, B., Rajendran, J. J., Sinanoglu, O. SARLock: SAT attack resistant logic locking. In: 2016 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), pp. 236–241. IEEE (2016)

    Google Scholar 

  10. Saha, A., Saha, S., Chowdhury, S., Mukhopadhyay, D., Bhattacharya, B.B.: LoPher: SAT-hardened logic embedding on block ciphers. In: 2020 57th ACM/IEEE Design Automation Conference (DAC), pp. 1–6. IEEE (2020)

    Google Scholar 

  11. Kamali, H. M., Azar, K. Z., Homayoun, H., Sasan, A.: Full-lock: Hard distributions of sat instances for obfuscating circuits using fully configurable logic and routing blocks. In: Proceedings of the 56th Annual Design Automation Conference, pp. 1–6 (2019)

    Google Scholar 

  12. Xu, X., Shakya, B., Tehranipoor, M.M., & Forte, D.: Novel bypass attack and BDD-based tradeoff analysis against all known logic locking attacks. In: 2017 International Conference on Cryptographic Hardware and Embedded Systems, pp. 189–210. Springer, Cham (2017)

    Google Scholar 

  13. Yasin, M., Mazumdar, B., Sinanoglu, O., Rajendran, J.: Removal attacks on logic locking and camouflaging techniques. IEEE Trans. Emerg. Top. Comput. 8(2), 517–532 (2017)

    Article  Google Scholar 

  14. Sirone, D., Subramanyan, P.: Functional analysis attacks on logic locking. IEEE Trans. Inform. Forensics Sec. 15, 2514–2527 (2020)

    Article  Google Scholar 

  15. Meade, T., Zhao, Z., Zhang, S., Pan, D., Jin, Y.: Revisit sequential logic obfuscation: attacks and defenses. In: 2017 IEEE International Symposium on Circuits and Systems (ISCAS), pp. 1–4. IEEE (2017)

    Google Scholar 

  16. Fyrbiak, M., Wallat, S., Déchelotte, J., Albartus, N., Böcker, S., Tessier, R., Paar, C.: On the difficulty of FSM-based hardware obfuscation. In: IACR Transactions on Cryptographic Hardware and Embedded Systems, pp. 293–330 (2018)

    Google Scholar 

  17. Karmakar, R., Jana, S.S., Chattopadhyay, S.: A cellular automata guided obfuscation strategy for finite-state-machine synthesis. In: 2019 56th ACM/IEEE Design Automation Conference (DAC), pp. 1–6. IEEE (2019)

    Google Scholar 

  18. Chaudhuri, P.P., Chowdhury, D.R., Nandi, S., Chattopadhyay, S.: Additive Cellular Automata: Theory and Applications, vol. 43. Wiley (1997)

    Google Scholar 

  19. Saha, A., Banerjee, H., Chakraborty, R.S., Mukhopadhyay, D.: ORACALL: an oracle-based attack on cellular automata guided logic locking. IEEE Trans. Comput.-Aided Des. Integr. Circ. Syst. (2021)

    Google Scholar 

  20. Mukhopadhyay, D.: Design and analysis of cellular automata based cryptographic algorithms (2007). https://cse.iitkgp.ac.in/~debdeep/research/thesis.pdf

  21. Bogdanov, A., Knudsen, L.R., Leander, G., Paar, C., Poschmann, A., Robshaw, M.J., Seurin, Y., Vikkelsoe, C.: PRESENT: an ultra-lightweight block cipher. In: International Workshop on Cryptographic Hardware and Embedded Systems, pp. 450–466. Springer (2007)

    Google Scholar 

  22. Ghoshal, A., Sadhukhan, R., Patranabis, S., Datta, N., Picek, S., Mukhopadhyay, D.: Lightweight and side-channel secure 4\(\times \)4 s-boxes from cellular automata rules. In: IACR Transactions on Symmetric Cryptology, pp. 311–334 (2018)

    Google Scholar 

  23. Berkeley Logic Synthesis and Verification Group: ABC: a system for sequential synthesis and verification, release 10216 (2018). http://www.eecs.berkeley.edu/~alanmi/abc/

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Debdeep Mukhopadhyay .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Saha, A., Banerjee, H., Chakraborty, R.S., Mukhopadhyay, D. (2022). Revisiting Logic Obfuscation Using Cellular Automata. In: Das, S., Martinez, G.J. (eds) Proceedings of First Asian Symposium on Cellular Automata Technology. ASCAT 2022. Advances in Intelligent Systems and Computing, vol 1425. Springer, Singapore. https://doi.org/10.1007/978-981-19-0542-1_3

Download citation

Publish with us

Policies and ethics