This competition is open to students enrolled in undergraduate or graduate degree programs from around the world. Teams must identify an advisor -- either a faculty member, industry or governmental representative.
Registration is required and will remain open until the submission date.
There is no limit to the number of team members during the Qualification Round, but all members must be students enrolled in an undergraduate or graduate degree program.
Team members do not need to attend the same university/college.
All players must compete under only 1 team name; playing for multiple teams is not permitted.
Teams should work independently. Sharing answers privately or publicly, or collaborating with another team to secure multiple spots at Finals constitutes cheating.
Virtual participation in CSAW Finals is contingent upon finalists’ ability to adhere to the remote participation requirements. Details will be released prior to finalist notification.
The top-3 (student) teams will receive a cash prize (to be distributed in late November):
1st place team: $1000
2nd place team: $750
3rd place team: $500
Competitors will be given access to locked netlists and oracles (as executable binaries). Teams can use whatever techniques/algorithms they wish, but will be expected to document, explain, and justify their approaches for full credit.
Q: Where and when does Finals take place?
Answer: Finals will be held during CSAW '20. The CSAW Finals will be a virtual event hosted 05 - 08 November 2020, organized by NYU Center for Cybersecurity. We anticipate that virtual presentations will take place on Friday 06 November with an award ceremony on 08 Sunday November morning.
Q: Will all participants attack a locking technique? Can participants offer locked defenses?
Answer: Participants can either attack a locked netlist or can volunteer a defense (i.e. offer a locked netlist) or both
Q: How are US government agencies involved in this?
Answer: Initially, we expect SMEs from agencies participating in this program. In the long term, this may inform programs that the agencies may plan.
Q: I am from a company. How can I contribute to Logic Locking Conquest?
Answer: You can request to be a judge or an observer. You can advise a team (although only student members will be eligible for travel and awards etc). You can sponsor student travel, etc.
Q: I am an SME from the US Government. How can I contribute to Logic Locking Conquest?
Answer: You can request to be a judge or as an observer. You can advise a team (although only student members will eligible for travel and awards, etc). You can sponsor student travel, etc.
Q: I am a University researcher and I am not an expert in logic locking. How can I take part?
Answer: You can form and advise a team and bring a revolutionary new perspective and solution to this problem.
Q: Who do I contact with questions?
Answer: You can email Benjamin Tan (csaw-logiclocking@nyu.edu)
“You Break I Fix: A Collaborative Approach for Strengthening Sequential Obfuscation of Hardware Intellectual Property” by MM Rahman, T Meade, Y Jin, S Bhunia in Annual Government Microcircuit Applications & Critical Technology (GOMACTech) Conference 2020, CA, USA.
“HARPOON: An Obfuscation-Based SoC Design Methodology for Hardware Protection” by RS Chakraborty, S Bhunia in IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems ( Volume: 28 , Issue: 10 , Oct. 2009 ).
N.B: While this article bears some similarity to the algorithm used in this challenge, the implementation strategies used are not identical