Benchmarking at the Frontier of Hardware Security: Lessons from Logic Locking. Tan, B., Karri, R., Limaye, N., Sengupta, A., Sinanoglu, O., Rahman, M. M., Bhunia, S., Duvalsaint, D., D., R., Blanton, Rezaei, A., Shen, Y., Zhou, H., Li, L., Orailoglu, A., Han, Z., Benedetti, A., Brignone, L., Yasin, M., Rajendran, J., Zuzak, M., Srivastava, A., Guin, U., Karfa, C., Basu, K., Menon, V. V., French, M., Song, P., Stellari, F., Nam, G., Gadfort, P., Althoff, A., Tostenrude, J., Fazzari, S., Breckenfeld, E., & Plaks, K. June, 2020. Paper abstract bibtex 2 downloads Integrated circuits (ICs) are the foundation of all computing systems. They comprise high-value hardware intellectual property (IP) that are at risk of piracy, reverse-engineering, and modifications while making their way through the geographically-distributed IC supply chain. On the frontier of hardware security are various design-for-trust techniques that claim to protect designs from untrusted entities across the design flow. Logic locking is one technique that promises protection from the gamut of threats in IC manufacturing. In this work, we perform a critical review of logic locking techniques in the literature, and expose several shortcomings. Taking inspiration from other cybersecurity competitions, we devise a community-led benchmarking exercise to address the evaluation deficiencies. In reflecting on this process, we shed new light on deficiencies in evaluation of logic locking and reveal important future directions. The lessons learned can guide future endeavors in other areas of hardware security.
@misc{tan_benchmarking_2020,
title = {Benchmarking at the {Frontier} of {Hardware} {Security}: {Lessons} from {Logic} {Locking}},
copyright = {All rights reserved},
shorttitle = {Benchmarking at the {Frontier} of {Hardware} {Security}},
url = {http://arxiv.org/abs/2006.06806},
abstract = {Integrated circuits (ICs) are the foundation of all computing systems. They comprise high-value hardware intellectual property (IP) that are at risk of piracy, reverse-engineering, and modifications while making their way through the geographically-distributed IC supply chain. On the frontier of hardware security are various design-for-trust techniques that claim to protect designs from untrusted entities across the design flow. Logic locking is one technique that promises protection from the gamut of threats in IC manufacturing. In this work, we perform a critical review of logic locking techniques in the literature, and expose several shortcomings. Taking inspiration from other cybersecurity competitions, we devise a community-led benchmarking exercise to address the evaluation deficiencies. In reflecting on this process, we shed new light on deficiencies in evaluation of logic locking and reveal important future directions. The lessons learned can guide future endeavors in other areas of hardware security.},
urldate = {2020-06-20},
author = {Tan, Benjamin and Karri, Ramesh and Limaye, Nimisha and Sengupta, Abhrajit and Sinanoglu, Ozgur and Rahman, Md Moshiur and Bhunia, Swarup and Duvalsaint, Danielle and D., R. and {Blanton} and Rezaei, Amin and Shen, Yuanqi and Zhou, Hai and Li, Leon and Orailoglu, Alex and Han, Zhaokun and Benedetti, Austin and Brignone, Luciano and Yasin, Muhammad and Rajendran, Jeyavijayan and Zuzak, Michael and Srivastava, Ankur and Guin, Ujjwal and Karfa, Chandan and Basu, Kanad and Menon, Vivek V. and French, Matthew and Song, Peilin and Stellari, Franco and Nam, Gi-Joon and Gadfort, Peter and Althoff, Alric and Tostenrude, Joseph and Fazzari, Saverio and Breckenfeld, Eric and Plaks, Kenneth},
month = jun,
year = {2020},
keywords = {Computer Science - Cryptography and Security},
}
Downloads: 2
{"_id":"949CxZrjjLfgeuN6d","bibbaseid":"tan-karri-limaye-sengupta-sinanoglu-rahman-bhunia-duvalsaint-etal-benchmarkingatthefrontierofhardwaresecuritylessonsfromlogiclocking-2020","author_short":["Tan, B.","Karri, R.","Limaye, N.","Sengupta, A.","Sinanoglu, O.","Rahman, M. M.","Bhunia, S.","Duvalsaint, D.","D., R.","Blanton","Rezaei, A.","Shen, Y.","Zhou, H.","Li, L.","Orailoglu, A.","Han, Z.","Benedetti, A.","Brignone, L.","Yasin, M.","Rajendran, J.","Zuzak, M.","Srivastava, A.","Guin, U.","Karfa, C.","Basu, K.","Menon, V. V.","French, M.","Song, P.","Stellari, F.","Nam, G.","Gadfort, P.","Althoff, A.","Tostenrude, J.","Fazzari, S.","Breckenfeld, E.","Plaks, K."],"bibdata":{"bibtype":"misc","type":"misc","title":"Benchmarking at the Frontier of Hardware Security: Lessons from Logic Locking","copyright":"All rights reserved","shorttitle":"Benchmarking at the Frontier of Hardware Security","url":"http://arxiv.org/abs/2006.06806","abstract":"Integrated circuits (ICs) are the foundation of all computing systems. They comprise high-value hardware intellectual property (IP) that are at risk of piracy, reverse-engineering, and modifications while making their way through the geographically-distributed IC supply chain. On the frontier of hardware security are various design-for-trust techniques that claim to protect designs from untrusted entities across the design flow. Logic locking is one technique that promises protection from the gamut of threats in IC manufacturing. In this work, we perform a critical review of logic locking techniques in the literature, and expose several shortcomings. Taking inspiration from other cybersecurity competitions, we devise a community-led benchmarking exercise to address the evaluation deficiencies. In reflecting on this process, we shed new light on deficiencies in evaluation of logic locking and reveal important future directions. The lessons learned can guide future endeavors in other areas of hardware security.","urldate":"2020-06-20","author":[{"propositions":[],"lastnames":["Tan"],"firstnames":["Benjamin"],"suffixes":[]},{"propositions":[],"lastnames":["Karri"],"firstnames":["Ramesh"],"suffixes":[]},{"propositions":[],"lastnames":["Limaye"],"firstnames":["Nimisha"],"suffixes":[]},{"propositions":[],"lastnames":["Sengupta"],"firstnames":["Abhrajit"],"suffixes":[]},{"propositions":[],"lastnames":["Sinanoglu"],"firstnames":["Ozgur"],"suffixes":[]},{"propositions":[],"lastnames":["Rahman"],"firstnames":["Md","Moshiur"],"suffixes":[]},{"propositions":[],"lastnames":["Bhunia"],"firstnames":["Swarup"],"suffixes":[]},{"propositions":[],"lastnames":["Duvalsaint"],"firstnames":["Danielle"],"suffixes":[]},{"propositions":[],"lastnames":["D."],"firstnames":["R."],"suffixes":[]},{"firstnames":[],"propositions":[],"lastnames":["Blanton"],"suffixes":[]},{"propositions":[],"lastnames":["Rezaei"],"firstnames":["Amin"],"suffixes":[]},{"propositions":[],"lastnames":["Shen"],"firstnames":["Yuanqi"],"suffixes":[]},{"propositions":[],"lastnames":["Zhou"],"firstnames":["Hai"],"suffixes":[]},{"propositions":[],"lastnames":["Li"],"firstnames":["Leon"],"suffixes":[]},{"propositions":[],"lastnames":["Orailoglu"],"firstnames":["Alex"],"suffixes":[]},{"propositions":[],"lastnames":["Han"],"firstnames":["Zhaokun"],"suffixes":[]},{"propositions":[],"lastnames":["Benedetti"],"firstnames":["Austin"],"suffixes":[]},{"propositions":[],"lastnames":["Brignone"],"firstnames":["Luciano"],"suffixes":[]},{"propositions":[],"lastnames":["Yasin"],"firstnames":["Muhammad"],"suffixes":[]},{"propositions":[],"lastnames":["Rajendran"],"firstnames":["Jeyavijayan"],"suffixes":[]},{"propositions":[],"lastnames":["Zuzak"],"firstnames":["Michael"],"suffixes":[]},{"propositions":[],"lastnames":["Srivastava"],"firstnames":["Ankur"],"suffixes":[]},{"propositions":[],"lastnames":["Guin"],"firstnames":["Ujjwal"],"suffixes":[]},{"propositions":[],"lastnames":["Karfa"],"firstnames":["Chandan"],"suffixes":[]},{"propositions":[],"lastnames":["Basu"],"firstnames":["Kanad"],"suffixes":[]},{"propositions":[],"lastnames":["Menon"],"firstnames":["Vivek","V."],"suffixes":[]},{"propositions":[],"lastnames":["French"],"firstnames":["Matthew"],"suffixes":[]},{"propositions":[],"lastnames":["Song"],"firstnames":["Peilin"],"suffixes":[]},{"propositions":[],"lastnames":["Stellari"],"firstnames":["Franco"],"suffixes":[]},{"propositions":[],"lastnames":["Nam"],"firstnames":["Gi-Joon"],"suffixes":[]},{"propositions":[],"lastnames":["Gadfort"],"firstnames":["Peter"],"suffixes":[]},{"propositions":[],"lastnames":["Althoff"],"firstnames":["Alric"],"suffixes":[]},{"propositions":[],"lastnames":["Tostenrude"],"firstnames":["Joseph"],"suffixes":[]},{"propositions":[],"lastnames":["Fazzari"],"firstnames":["Saverio"],"suffixes":[]},{"propositions":[],"lastnames":["Breckenfeld"],"firstnames":["Eric"],"suffixes":[]},{"propositions":[],"lastnames":["Plaks"],"firstnames":["Kenneth"],"suffixes":[]}],"month":"June","year":"2020","keywords":"Computer Science - Cryptography and Security","bibtex":"@misc{tan_benchmarking_2020,\n\ttitle = {Benchmarking at the {Frontier} of {Hardware} {Security}: {Lessons} from {Logic} {Locking}},\n\tcopyright = {All rights reserved},\n\tshorttitle = {Benchmarking at the {Frontier} of {Hardware} {Security}},\n\turl = {http://arxiv.org/abs/2006.06806},\n\tabstract = {Integrated circuits (ICs) are the foundation of all computing systems. They comprise high-value hardware intellectual property (IP) that are at risk of piracy, reverse-engineering, and modifications while making their way through the geographically-distributed IC supply chain. On the frontier of hardware security are various design-for-trust techniques that claim to protect designs from untrusted entities across the design flow. Logic locking is one technique that promises protection from the gamut of threats in IC manufacturing. In this work, we perform a critical review of logic locking techniques in the literature, and expose several shortcomings. Taking inspiration from other cybersecurity competitions, we devise a community-led benchmarking exercise to address the evaluation deficiencies. In reflecting on this process, we shed new light on deficiencies in evaluation of logic locking and reveal important future directions. The lessons learned can guide future endeavors in other areas of hardware security.},\n\turldate = {2020-06-20},\n\tauthor = {Tan, Benjamin and Karri, Ramesh and Limaye, Nimisha and Sengupta, Abhrajit and Sinanoglu, Ozgur and Rahman, Md Moshiur and Bhunia, Swarup and Duvalsaint, Danielle and D., R. and {Blanton} and Rezaei, Amin and Shen, Yuanqi and Zhou, Hai and Li, Leon and Orailoglu, Alex and Han, Zhaokun and Benedetti, Austin and Brignone, Luciano and Yasin, Muhammad and Rajendran, Jeyavijayan and Zuzak, Michael and Srivastava, Ankur and Guin, Ujjwal and Karfa, Chandan and Basu, Kanad and Menon, Vivek V. and French, Matthew and Song, Peilin and Stellari, Franco and Nam, Gi-Joon and Gadfort, Peter and Althoff, Alric and Tostenrude, Joseph and Fazzari, Saverio and Breckenfeld, Eric and Plaks, Kenneth},\n\tmonth = jun,\n\tyear = {2020},\n\tkeywords = {Computer Science - Cryptography and Security},\n}\n","author_short":["Tan, B.","Karri, R.","Limaye, N.","Sengupta, A.","Sinanoglu, O.","Rahman, M. M.","Bhunia, S.","Duvalsaint, D.","D., R.","Blanton","Rezaei, A.","Shen, Y.","Zhou, H.","Li, L.","Orailoglu, A.","Han, Z.","Benedetti, A.","Brignone, L.","Yasin, M.","Rajendran, J.","Zuzak, M.","Srivastava, A.","Guin, U.","Karfa, C.","Basu, K.","Menon, V. V.","French, M.","Song, P.","Stellari, F.","Nam, G.","Gadfort, P.","Althoff, A.","Tostenrude, J.","Fazzari, S.","Breckenfeld, E.","Plaks, K."],"key":"tan_benchmarking_2020","id":"tan_benchmarking_2020","bibbaseid":"tan-karri-limaye-sengupta-sinanoglu-rahman-bhunia-duvalsaint-etal-benchmarkingatthefrontierofhardwaresecuritylessonsfromlogiclocking-2020","role":"author","urls":{"Paper":"http://arxiv.org/abs/2006.06806"},"keyword":["Computer Science - Cryptography and Security"],"metadata":{"authorlinks":{}},"downloads":2},"bibtype":"misc","biburl":"https://api.zotero.org/users/4645877/collections/5QADJUWI/items?key=OGCZ3uLZZq4lLIXadnuJrB1J&format=bibtex&limit=100","dataSources":["i5A8jKqyW67R7nn75","K9SRKdiQNw6WZkhae","oodiEqv3HQNeZtGeC","iTGGPbkxPJCvmCa3T","rETsYocnR7ibszSJ4","TRtmubHSqHw6999cH","xdzEqXoYhRJckM7XG","Wsv2bQ4jPuc7qme8R"],"keywords":["computer science - cryptography and security"],"search_terms":["benchmarking","frontier","hardware","security","lessons","logic","locking","tan","karri","limaye","sengupta","sinanoglu","rahman","bhunia","duvalsaint","d.","blanton","rezaei","shen","zhou","li","orailoglu","han","benedetti","brignone","yasin","rajendran","zuzak","srivastava","guin","karfa","basu","menon","french","song","stellari","nam","gadfort","althoff","tostenrude","fazzari","breckenfeld","plaks"],"title":"Benchmarking at the Frontier of Hardware Security: Lessons from Logic Locking","year":2020,"downloads":2}