{"id":3976,"date":"2023-01-07T18:47:29","date_gmt":"2023-01-07T18:47:29","guid":{"rendered":"http:\/\/cad4security.org\/?page_id=3976"},"modified":"2023-07-10T14:26:21","modified_gmt":"2023-07-10T14:26:21","slug":"ch14_probing_on_logic_locking","status":"publish","type":"page","link":"http:\/\/cad4security.org\/index.php\/trainings\/hsl\/ch14_probing_on_logic_locking\/","title":{"rendered":"Chapter 14: Laser Probing on Logic Locking"},"content":{"rendered":"\n<h2 class=\"is-style-subheading wp-block-heading\"><strong>Chapter 14<\/strong><\/h2>\n\n\n\n<h2 class=\"is-style-subheading wp-block-heading\" style=\"font-style:normal;font-weight:100\">Optical Probing Attack on Logic Locking<\/h2>\n\n\n\n<p>Logic locking has been proposed as an obfuscation technique to protect outsourced IC designs from IP piracy by untrusted entities in the design and fabrication process. In this case, the netlist is locked by adding extra key-gates, and will be unlocked only if a correct key is applied to the key-gates. The key is assumed to be written into a non-volatile memory after the fabrication by the IP owner. In this chapter, we conduct experiments on logic locking implementations on a Flash-based FPGA fabricated in 28 nm technology node. Moreover, we demonstrate, step by step, how to extract the entire key by localizing and probing the key-gates\/registers using optical probing from the IC backside. Our results show that logic locking can be quite vulnerable to physical attacks mounted by an end-user with no access to the circuit layout.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link button\" href=\"http:\/\/cad4security.org\/wp-content\/uploads\/Chapter14_Optical-Probing-Attack-on-Logic-Locking.zip\">download chapter files<\/a><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Chapter 14 Optical Probing Attack on Logic Locking Logic locking has been proposed as an obfuscation technique to protect outsourced IC designs from IP piracy by untrusted entities in the design and fabrication process. In this case, the netlist is locked by adding extra key-gates, and will be unlocked only if a correct key is &hellip;<\/p>\n","protected":false},"author":6,"featured_media":2565,"parent":3964,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"acf":[],"_links":{"self":[{"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/pages\/3976"}],"collection":[{"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/comments?post=3976"}],"version-history":[{"count":4,"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/pages\/3976\/revisions"}],"predecessor-version":[{"id":4627,"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/pages\/3976\/revisions\/4627"}],"up":[{"embeddable":true,"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/pages\/3964"}],"wp:featuredmedia":[{"embeddable":true,"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/media\/2565"}],"wp:attachment":[{"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/media?parent=3976"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}