[Resource Topic] 2019/1443: CAS-Unlock: Unlocking CAS-Lock without Access to a Reverse-Engineered Netlist

Welcome to the resource topic for 2019/1443

Title:
CAS-Unlock: Unlocking CAS-Lock without Access to a Reverse-Engineered Netlist

Authors: Abhrajit Sengupta, Ozgur Sinanoglu

Abstract:

CAS-Lock (cascaded locking) is a SAT-resilient locking technique, which can simultaneously thwart SAT and bypass attack, while maintaining non-trivial output corruptibility. Despite all of its theoretical guarantees, in this report we expose a serious flaw in its design that can be exploited to break CAS-Lock. Further, this attack neither requires access to a reverse-engineered netlist, nor it requires a working oracle with the correct key loaded onto the chip’s memory. We demonstrate that we can activate any CAS-Locked IC without knowing the secret key.

ePrint: https://eprint.iacr.org/2019/1443

See all topics related to this paper.

Feel free to post resources that are related to this paper below.

Example resources include: implementations, explanation materials, talks, slides, links to previous discussions on other websites.

For more information, see the rules for Resource Topics .