Fortifying RTL Locking Against Oracle-Less (Untrusted Foundry) and Oracle-Guided Attacks
TimeTuesday, December 7th10:53am - 11:16am PST
Event Type
Research Manuscript
Virtual Programs
Presented In-Person
Hardware Security: Attack and Defense
DescriptionLogic locking protects integrated circuits (IC) against intellectual property (IP) theft, IC overbuilding, and hardware Trojan insertion. Prior locking schemes operate after logic synthesis and cannot protect the semantic information embedded into the logic. Register-transfer level (RTL) locking techniques can protect the sensitive IP semantics and are EDA tool-chain agnostic, allowing seamless integration into arbitrary design flows. State-of-the-art RTL locking protects against the untrusted foundry assuming they have no working chip (oracle). We propose to fortify RTL locking to protect against all untrusted entities in the supply chain, viz., foundry (oracle-less attacks), test facility, and end-users (oracle-guided attacks).