2019
DOI: 10.1109/tcad.2018.2801220
|View full text |Cite
|
Sign up to set email alerts
|

Anti-SAT: Mitigating SAT Attack on Logic Locking

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
107
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 159 publications
(112 citation statements)
references
References 27 publications
0
107
0
Order By: Relevance
“…Moreover, SAT formulation is an NP-Complete problem and the heuristic-based solutions are not guaranteed to give a solution within reasonable time. Different protections [9], [10], [8] against SAT attack [2] have been proposed that generally involve adding extra logic to increase either the number of iterations of the attack or the time to complete each iteration. In [1], an approximate key is retrieved that shows output corruptibility for very few inputs and can bypass the protections offered by [9].…”
Section: Background and Related Workmentioning
confidence: 99%
“…Moreover, SAT formulation is an NP-Complete problem and the heuristic-based solutions are not guaranteed to give a solution within reasonable time. Different protections [9], [10], [8] against SAT attack [2] have been proposed that generally involve adding extra logic to increase either the number of iterations of the attack or the time to complete each iteration. In [1], an approximate key is retrieved that shows output corruptibility for very few inputs and can bypass the protections offered by [9].…”
Section: Background and Related Workmentioning
confidence: 99%
“…This essentially leaves the attacker to decipher <48 key bits, which can be simply achieved by applying a brute-force attack. 8 Therefore, barring b17 (for sixteen scan chains configuration), Fig. 8: Boundary scan cell design.…”
Section: A Attack Resultsmentioning
confidence: 99%
“…These benchmark circuits remain reflective of contemporary combinational circuits and have been used extensively in prior work on logic locking, e.g. [18,22,27]. We implemented the TTLock and SFLL locking algorithms for varying values of the Hamming distance parameter h and maximum key size of 128 bits.…”
Section: A Methodologymentioning
confidence: 99%