3.8 Proceedings Paper

Designing ML-Resilient Locking at Register-Transfer Level

出版社

ASSOC COMPUTING MACHINERY
DOI: 10.1145/3489517.3530541

关键词

logic locking; RTL; IP protection; machine learning; deobfuscation

资金

  1. ONR [N00014-18-1-2058]
  2. NSF [1526405]
  3. NYU Center for Cybersecurity
  4. NYUAD Center for Cybersecurity

向作者/读者索取更多资源

This paper investigates the resilience of the state-of-the-art RTL locking method ASSURE against machine-learning attacks. Two machine-learning reinforced RTL locking schemes are proposed based on the lessons learned. ML-driven security metrics are also developed to evaluate the schemes against the latest ML-based attacks.
Various logic-locking schemes have been proposed to protect hardware from intellectual property piracy and malicious design modifications. Since traditional locking techniques are applied on the gate-level netlist after logic synthesis, they have no semantic knowledge of the design function. Data-driven, machine-learning (ML) attacks can uncover the design flaws within gate-level locking. Recent proposals on register-transfer level (RTL) locking have access to semantic hardware information. We investigate the resilience of ASSURE, a state-of-the-art RTL locking method, against ML attacks. We used the lessons learned to derive two ML-resilient RTL locking schemes built to reinforce ASSURE locking. We developed ML-driven security metrics to evaluate the schemes against an RTL adaptation of the state-of-the-art, ML-based SnapShot attack.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

3.8
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据