The MiG-V was designed for high-security applications and is the first commercially available logic-locked RISC-V processor on the market. In this context logic locking was used to protect the RISC-V processor design during the untrusted manufacturing process by using key-driven logic gates to obfuscate the original design. Although this method defends against malicious modifications, such as hardware Trojans, logic locking's impact on the RISC-V processor's data confidentiality during runtime has not been thoroughly examined. In this study, we evaluate the impact of logic locking on data confidentiality. By altering the logic locking key of the MiG-V while running SSL cryptographic algorithms, we identify data leakages resulting from the exploitation of the logic locking hardware. We show that changing a single bit of the logic locking key can expose 100% of the cryptographic encryption key. This research reveals a critical security flaw in logic locking, highlighting the need for comprehensive security assessments beyond logic locking key-recovery attacks.
翻译:MiG-V专为高安全性应用设计,是市场上首款商用逻辑锁定RISC-V处理器。在该设计中,逻辑锁定技术通过密钥驱动的逻辑门对原始设计进行混淆,以在不可信的制造过程中保护RISC-V处理器设计。尽管该方法能防御恶意修改(如硬件木马),但逻辑锁定对RISC-V处理器运行时数据保密性的影响尚未得到深入研究。本研究评估了逻辑锁定对数据保密性的影响。通过改变MiG-V运行SSL加密算法时的逻辑锁定密钥,我们发现了利用逻辑锁定硬件导致的数据泄露。实验表明,仅改变逻辑锁定密钥的单个比特即可暴露100%的加密密钥。这项研究揭示了逻辑锁定技术中存在的关键安全缺陷,强调需要开展超越逻辑锁定密钥恢复攻击的全面安全评估。