PrimLock: Leveraging Linear Programming to Optimize Primitive Logic Locking
DOI:
https://doi.org/10.63313/CS.8015Keywords:
Logic locking, Linear programming, Hardware security, PrimLockAbstract
This paper presents PrimLock, a logic locking framework that employs integer linear programming (ILP) to optimize key gate placement in integrated circuits (ICs), addressing vulnerabilities like IP theft and hardware Trojans in untrusted supply chains. Existing methods suffer from heuristic key placement, scalability limitations, and susceptibility to SAT attacks. PrimLock introduces a du-al-circuit ILP model that maximizes output corruption under incorrect keys while minimizing computational overhead. A standardized security metric quantifies resilience as the percentage of corrupted outputs, validated on the C17 benchmark. Results show 100% corruption in critical test cases, outper-forming heuristic and SAT-resistant approaches. Constraint reduction tech-niques reduce computational complexity significantly, enabling scalability to industrial designs. This work establishes a mathematically rigorous foundation for logic locking, balancing provable security with practical efficiency.
References
[1] C. Pilato, A. B. Chowdhury, D. Sciuto, S. Garg, and R. Karri, "ASSURE: RTL locking against an untrusted foundry," IEEE Transactions on Very Large Scale Integration (VLSI) Systems, vol. 29, no. 7, pp. 1306-1318, 2021.
[2] S. Aftabjahani et al., "Special Session: CAD for Hardware Security-Promising Directions for Automation of Security Assurance," in 2023 IEEE 41st VLSI Test Symposium (VTS), 2023: IEEE, pp. 1-10.
[3] T. A. Ahanger, U. Tariq, F. Dahan, S. A. Chaudhry, and Y. Malik, "Securing IoT devices run-ning PureOS from ransomware attacks: leveraging hybrid machine learning techniques," Mathematics, vol. 11, no. 11, p. 2481, 2023.
[4] J. Rajendran, V. M. Vedula, and R. Karri, "Detecting malicious modifications of data in third-party intellectual property cores," 2015 52nd ACM/EDAC/IEEE Design Automation Conference (DAC), pp. 1-6, 2015.
[5] X. Liu et al., "Privacy and Security Issues in Deep Learning: A Survey," IEEE Access, vol. 9, pp. 4566-4593, 2021.
[6] P. Subramanyan, S. Ray, and S. Malik, "Evaluating the security of logic encryption algo-rithms," 2015 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), pp. 137-143, 2015.
[7] X. Chen et al., "Hardware Trojan Detection in Third-Party Digital Intellectual Property Cores by Multilevel Feature Analysis," IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, vol. 37, pp. 1370-1383, 2018.
[8] T. C. Cheng and H. Liu, "Intelligent Freight Optimization in High Semiconductor Industries Using Advanced Data Analytics," 2024 IEEE International Conference on Industrial Engi-neering and Engineering Management (IEEM), pp. 318-321, 2024.
[9] M. Yasin, J. Rajendran, O. Sinanoglu, and R. Karri, "On Improving the Security of Logic Locking," IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, vol. 35, pp. 1411-1424, 2016.
[10] M. Yasin, B. Mazumdar, J. Rajendran, and O. Sinanoglu, "SARLock: SAT attack resistant logic locking," 2016 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), pp. 236-241, 2016.
[11] M. Yasin and O. Sinanoglu, "Evolution of logic locking," 2017 IFIP/IEEE International Con-ference on Very Large Scale Integration (VLSI-SoC), pp. 1-6, 2017.
[12] Y. Xie and A. Srivastava, "Anti-SAT: Mitigating SAT Attack on Logic Locking," IEEE Trans-actions on Computer-Aided Design of Integrated Circuits and Systems, vol. 38, pp. 199-207, 2019.
[13] A. Chakraborty et al., "Keynote: A Disquisition on Logic Locking," IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, vol. 39, pp. 1952-1972, 2020.
[14] M. S. V. S. Rathor, K. S. Sahoo and S. P. Mohanty, "GateLock: Input-Dependent Key-Based Locked Gates for SAT Resistant Logic Locking," IEEE Transactions on Very Large Scale In-tegration (VLSI) Systems, vol. 32, no. 2, pp. 361-371, 2024, doi: doi: 10.1109/TVLSI.2023.3340350.
[15] Y. Aghamohammadi and A. Rezaei, "Lipstick: Corruptibility-aware and explainable graph neural network-based oracle-less attack on logic locking," in 2024 29th Asia and South Pa-cific Design Automation Conference (ASP-DAC), 2024: IEEE, pp. 606-611.
[16] A. D. Raj, N. Avula, P. Das, D. Sisejkovic, F. Merchant, and A. Acharyya, "DeepAttack: A Deep Learning Based Oracle-less Attack on Logic Locking," 2023 IEEE International Symposium on Circuits and Systems (ISCAS), pp. 1-5, 2023.
[17] A. S. V, N. M. Sivamangai, R. Naveenkumar, and N. A, "Importance of Logic Locking Attacks in Hardware Security," 2023 International Conference on Intelligent Data Communication Technologies and Internet of Things (IDCIoT), pp. 156-160, 2023.
[18] M. R. Muttaki, R. Mohammadivojdan, H. Mardani Kamali, M. M. Tehranipoor, and F. Farah-mandi, "HLock+: A Robust and Low-Overhead Logic Locking at the High-Level Language," IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, vol. 42, pp. 2149-2162, 2023.
[19] S. D. Chowdhury, K. Yang, and P. Nuzzo, "SimLL: Similarity-based logic locking against machine learning attacks," in 2023 60th ACM/IEEE Design Automation Conference (DAC), 2023: IEEE, pp. 1-6.
[20] I.-C. Tsai, Y. Zhong, F.-R. Liu, and J. Feng, "A Novel Security Assessment Method Based on Linear Regression for Logic Locking," in 2019 IEEE International Conference on Electron Devices and Solid-State Circuits (EDSSC), 2019: IEEE, pp. 1-3.
[21] B. Mazumdar, S. Saha, G. Bairwa, S. Mandal, and T. V. Nikhil, "Classical Cryptanalysis Attacks on Logic Locking Techniques," Journal of Electronic Testing, vol. 35, pp. 641-654, 2019.
[22] Y. Zhong, A. Jain, M. T. Rahman, N. Asadizanjani, J. Xie, and U. Guin, "AFIA: ATPG-guided fault injection attack on secure logic locking," Journal of Electronic Testing, vol. 38, no. 5, pp. 527-546, 2022.
[23] R. Karmakar and S. Chattopadhyay, "A particle swarm optimization guided approximate key search attack on logic locking in the absence of scan access," in 2020 Design, Automa-tion & Test in Europe Conference & Exhibition (DATE), 2020: IEEE, pp. 448-453.
[24] B. Zhang, Y. Gao, X. Liu, and X. Huang, "A new deterministic global computing algorithm for solving a kind of linear fractional programming," Optimization, vol. 72, no. 6, pp. 1485-1513, 2023.
[25] F. Yang, M. Tang, and O. Sinanoglu, "Stripped functionality logic locking with Hamming distance-based restore unit (SFLL-hd)–unlocked," IEEE Transactions on Information Fo-rensics and Security, vol. 14, no. 10, pp. 2778-2786, 2019.
[26] I. Verbauwhede, K. Tiri, D. Hwang, and P. Schaumont, "Circuits and design techniques for secure ICs resistant to side-channel attacks," in 2006 IEEE International Conference on IC Design and Technology, 2006: IEEE, pp. 1-4.
[27] A. Jain, M. T. Rahman, and U. Guin, "Atpg-guided fault injection attacks on logic locking," in 2020 IEEE Physical Assurance and Inspection of Electronics (PAINE), 2020: IEEE, pp. 1-6.
Downloads
Published
Issue
Section
License
Copyright (c) 2025 by author(s) and Erytis Publishing Limited.

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.