2018
DOI: 10.46586/tches.v2019.i1.97-122
|View full text |Cite
|
Sign up to set email alerts
|

SMT Attack: Next Generation Attack on Obfuscated Circuits with Capabilities and Performance Beyond the SAT Attacks

Abstract: In this paper, we introduce the Satisfiability Modulo Theory (SMT) attack on obfuscated circuits. The proposed attack is the superset of Satisfiability (SAT) attack, with many additional features. It uses one or more theory solvers in addition to its internal SAT solver. For this reason, it is capable of modeling far more complex behaviors and could formulate much stronger attacks. In this paper, we illustrate that the use of theory solvers enables the SMT to carry attacks that are not possible by SAT formulat… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
27
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
3

Relationship

3
5

Authors

Journals

citations
Cited by 59 publications
(28 citation statements)
references
References 15 publications
1
27
0
Order By: Relevance
“…Although there have been advancements in logic locking techniques [9], researchers have been able to ind the vulnerabilities in many of the most prominent obfuscation schemes. Attacks such as CycSAT, SMT-Solver [4,6,8,32] show that by considering just a few conditions and pre-processing steps, designs obfuscated with cyclic obfuscation can be reverse-engineered. The state-of-the-art attack SFLL-HD [54] has also been successfully defeated using FALL-attack [41] which does not require an oracle IC to ind the correct key making the attack even more feasible.…”
Section: Post-sat Obfuscation and Challengesmentioning
confidence: 99%
See 2 more Smart Citations
“…Although there have been advancements in logic locking techniques [9], researchers have been able to ind the vulnerabilities in many of the most prominent obfuscation schemes. Attacks such as CycSAT, SMT-Solver [4,6,8,32] show that by considering just a few conditions and pre-processing steps, designs obfuscated with cyclic obfuscation can be reverse-engineered. The state-of-the-art attack SFLL-HD [54] has also been successfully defeated using FALL-attack [41] which does not require an oracle IC to ind the correct key making the attack even more feasible.…”
Section: Post-sat Obfuscation and Challengesmentioning
confidence: 99%
“…The total number of cores ranging from 16 to 24, with RAM varying from 64GB to 512GB. For the experimental evaluation, we use benchmarks from ISCAS-85 2 , ISCAS-89 3 and Common Evaluation Platform (CEP) 4 . The benchmarks are listed as part of Table 2.…”
Section: Experimental Evaluation 51 Experimental Setupmentioning
confidence: 99%
See 1 more Smart Citation
“…Mathematically, solving the IC deobfuscation problem is often considered equivalent to solving the Boolean SAT of a CNF (Yasin et al, 2016a ; Shamsi et al, 2017 ; Zhou et al, 2017 ; Roshanisefat et al, 2018 ; Xie and Srivastava, 2018 ; Zamiri Azar et al, 2018 ). Specifically, the obfuscated IC, where several gates have been encrypted by replacing old gates with new gates and adding key inputs, can be equivalent to the original IC only when the key inputs are correctly inferred.…”
Section: Problem Setupmentioning
confidence: 99%
“…In some other techniques, the key-programmable cycles are added into the design, which traps the SAT solver in an infinite loop [26]- [28], [37], [38]. Although these solutions defeat the SAT attack, further investigation shows that this breed of obfuscation techniques is already broken using SMT attack [14], [45], timingSAT [46], and SAT-based attacks on cyclic obfuscation [12], [13], [47].…”
Section: ) Cyclic and Behavioral Obfuscationmentioning
confidence: 99%