International Association for Cryptologic Research

International Association
for Cryptologic Research

Transactions on Cryptographic Hardware and Embedded Systems, Volume 2021

Breaking CAS-Lock and Its Variants by Exploiting Structural Traces


Abhrajit Sengupta
New York University, NY, US

Nimisha Limaye
New York University, NY, US

Ozgur Sinanoglu
New York University Abu Dhabi, AD, UAE


Keywords: Anti-SAT, CAS-Lock/M-CAS, IP piracy, logic locking, removal attack, SAT attack, structural analysis


Abstract

Logic locking is a prominent solution to protect against design intellectual property theft. However, there has been a decade-long cat-and-mouse game between defenses and attacks. A turning point in logic locking was the development of miterbased Boolean satisfiability (SAT) attack that steered the research in the direction of developing SAT-resilient schemes. These schemes, however achieved SAT resilience at the cost of low output corruption. Recently, cascaded locking (CAS-Lock) [SXTF20a] was proposed that provides non-trivial output corruption all-the-while maintaining resilience to the SAT attack. Regardless of the theoretical properties, we revisit some of the assumptions made about its implementation, especially about security-unaware synthesis tools, and subsequently expose a set of structural vulnerabilities that can be exploited to break these schemes. We propose our attacks on baseline CAS-Lock as well as mirrored CAS (M-CAS), an improved version of CAS-Lock. We furnish extensive simulation results of our attacks on ISCAS’85 and ITC’99 benchmarks, where we show that CAS-Lock/M-CAS can be broken with ∼94% success rate. Further, we open-source all implementation scripts, locked circuits, and attack scripts for the community. Finally, we discuss the pitfalls of point function-based locking techniques including Anti-SAT [XS18] and Stripped Functionality Logic Locking (SFLL-HD) [YSN+17], which suffer from similar implementation issues.

Publication

Transactions of Cryptographic Hardware and Embedded Systems, Volume 2021, Issue 3

Paper

Artifact

Artifact number
tches/2021/a14

Artifact published
August 1, 2021

README

ZIP (42 MB)  

View on Github

License
GPLv3 This work is licensed under the GNU General Public License version 3.


BibTeX How to cite

Sengupta, A., Limaye, N., & Sinanoglu, O. (2021). Breaking CAS-Lock and Its Variants by Exploiting Structural Traces. IACR Transactions on Cryptographic Hardware and Embedded Systems, 2021(3), 418–440. https://doi.org/10.46586/tches.v2021.i3.418-440. Artifact at https://artifacts.iacr.org/tches/2021/a14.