2020 Design, Automation &Amp; Test in Europe Conference &Amp; Exhibition (DATE) 2020
DOI: 10.23919/date48585.2020.9116544
|View full text |Cite
|
Sign up to set email alerts
|

Estimating the Circuit De-obfuscation Runtime based on Graph Deep Learning

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
11
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
7
2

Relationship

2
7

Authors

Journals

citations
Cited by 18 publications
(13 citation statements)
references
References 21 publications
0
11
0
Order By: Relevance
“…Although there have been advancements in logic locking techniques [9], researchers have been able to ind the vulnerabilities in many of the most prominent obfuscation schemes. Attacks such as CycSAT, SMT-Solver [4,6,8,32] show that by considering just a few conditions and pre-processing steps, designs obfuscated with cyclic obfuscation can be reverse-engineered. The state-of-the-art attack SFLL-HD [54] has also been successfully defeated using FALL-attack [41] which does not require an oracle IC to ind the correct key making the attack even more feasible.…”
Section: Post-sat Obfuscation and Challengesmentioning
confidence: 99%
“…Although there have been advancements in logic locking techniques [9], researchers have been able to ind the vulnerabilities in many of the most prominent obfuscation schemes. Attacks such as CycSAT, SMT-Solver [4,6,8,32] show that by considering just a few conditions and pre-processing steps, designs obfuscated with cyclic obfuscation can be reverse-engineered. The state-of-the-art attack SFLL-HD [54] has also been successfully defeated using FALL-attack [41] which does not require an oracle IC to ind the correct key making the attack even more feasible.…”
Section: Post-sat Obfuscation and Challengesmentioning
confidence: 99%
“…The latest efforts in the logic locking community have been invested in challenging the security properties of locking schemes using ML. Recent works were able to efficiently attack pre-and post-SAT schemes [20]- [28]. The introduction of ML-based tools for the security analysis of logic locking has opened up a new chapter in the design of locking schemes and attacks, thereby initiating the start of the post-ML lockingscheme era.…”
Section: B the Advent Of Machine Learningmentioning
confidence: 99%
“…Deobfuscation Runtime Prediction: Apart from ML-based attacks, machine learning has also found its way into other aspects of logic locking. A recent work has designed a framework named ICNet for the prediction of the key-retrieval runtime for SAT-based attacks using graph neural networks [28]. The framework obtains the predicted deobfuscation runtime based on the characteristics of the circuit topology.…”
Section: Other Applications Of MLmentioning
confidence: 99%
“…GNNs have been evaluated on circuit-related problems as well [42]. In particular, GNNs have been used for attack time estimation on logic locking [10]. In this sense, GNNs offer a potentially fruitful research ground in the domain of hardware security.…”
Section: Limitations and Research Opportunitiesmentioning
confidence: 99%