Logic locking induced fault attacks

Michaela Brunner, Michael Gruber, Michael Tempelmeier, Georg Sigl

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Logic locking has been presented in the past as a solution to avoid overproduction or product piracy. All solutions so far assume or rely on the protection of the correct locking key. This paper does not target the break of locking schemes but looks at another highly critical security risk which comes with modified locking keys: The enabling of fault attacks. We will analyze the applicability of the risk based on different logic locking methods, key management techniques, and fault analysis techniques. Additionally, we will demonstrate its threat by a modified template based persistent fault analysis on an AES implementation. There, the fault injection is realized by randomly inserted locking gates and a permanently modified locking key.

Original languageEnglish
Title of host publicationProceedings - 2020 IEEE Computer Society Annual Symposium on VLSI, ISVLSI 2020
PublisherIEEE Computer Society
Pages114-119
Number of pages6
ISBN (Electronic)9781728157757
DOIs
StatePublished - Jul 2020
Event19th IEEE Computer Society Annual Symposium on VLSI, ISVLSI 2020 - Limassol, Cyprus
Duration: 6 Jul 20208 Jul 2020

Publication series

NameProceedings of IEEE Computer Society Annual Symposium on VLSI, ISVLSI
Volume2020-July
ISSN (Print)2159-3469
ISSN (Electronic)2159-3477

Conference

Conference19th IEEE Computer Society Annual Symposium on VLSI, ISVLSI 2020
Country/TerritoryCyprus
CityLimassol
Period6/07/208/07/20

Keywords

  • Fault attack
  • Hardware Trojan
  • Logic locking
  • Persistent fault analysis
  • S-box

Fingerprint

Dive into the research topics of 'Logic locking induced fault attacks'. Together they form a unique fingerprint.

Cite this