[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/2228360.2228377acmconferencesArticle/Chapter ViewAbstractPublication PagesdacConference Proceedingsconference-collections
research-article

Security analysis of logic obfuscation

Published: 03 June 2012 Publication History

Abstract

Due to globalization of Integrated Circuit (IC) design flow, rogue elements in the supply chain can pirate ICs, overbuild ICs, and insert hardware trojans. EPIC [1] obfuscates the design by randomly inserting additional gates; only a correct key makes the design to produce correct outputs. We demonstrate that an attacker can decipher the obfuscated netlist, in a time linear to the number of keys, by sensitizing the key values to the output. We then develop techniques to fix this vulnerability and make obfuscation truly exponential in the number of inserted keys.

References

[1]
J. Roy, F. Koushanfar, and I. Markov, "EPIC: Ending Piracy of Integrated Circuits," Proc. of Design, Automation and Test in Europe, pp. 1069--1074, 2008.
[2]
"Defense Science Board (DSB) study on High Performance Microchip Supply," http://www.acq.osd.mil/dsb/reports/ADA435563.pdf, 2005.
[3]
R. Karri, J. Rajendran, K. Rosenfeld, and M. Tehranipoor, "Trustworthy Hardware: Identifying and Classifying Hardware Trojans," IEEE Computer, vol. 43, no. 10, pp. 39--46, 2010.
[4]
SEMI, "Innovation is at risk as semiconductor equipment and materials industry loses up to $4 billion annually due to IP infringement," www.semi.org/en/Press/P043775, 2008.
[5]
M. L. Bushnell and V. D. Agrawal, "Essentials of Electronic Testing for Digital, Memory, and Mixed-Signal VLSI Circuits," Kluwer Academic Publishers. Boston, 2000.
[6]
H. Lee and D. Ha, "An efficient forward fault simulation algorithm based on the parallel pattern single fault propagation," Proc. of IEEE International Test Conference, pp. 946--955, 1991.
[7]
R. Chakraborty and S. Bhunia, "HARPOON: An Obfuscation-Based SoC Design Methodology for Hardware Protection," IEEE Transactions on Computer-Aided Design, vol. 28, no. 10, pp. 1493--1502, 2009.
[8]
A. Baumgarten, A. Tyagi, and J. Zambreno, "Preventing IC Piracy Using Reconfigurable Logic Barriers," IEEE Design and Test of Computers, vol. 27, no. 1, pp. 66--75, 2010.

Cited By

View all
  • (2025)Physically Secure Logic Locking With Nanomagnet LogicIEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems10.1109/TCAD.2024.343436244:1(105-118)Online publication date: Jan-2025
  • (2024)CRLock: A SAT and FALL Attacks Resistant Logic Locking Method for Controller at Register Transfer LevelIEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences10.1587/transfun.2023VLP0018E107.A:3(583-591)Online publication date: 1-Mar-2024
  • (2024)SFLL-AD: a self-adaptive and secure logic lockingIEICE Electronics Express10.1587/elex.20.2023055521:3(20230555-20230555)Online publication date: 10-Feb-2024
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
DAC '12: Proceedings of the 49th Annual Design Automation Conference
June 2012
1357 pages
ISBN:9781450311991
DOI:10.1145/2228360
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

In-Cooperation

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 03 June 2012

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. IP protection
  2. logic obfuscation

Qualifiers

  • Research-article

Funding Sources

Conference

DAC '12
Sponsor:
DAC '12: The 49th Annual Design Automation Conference 2012
June 3 - 7, 2012
California, San Francisco

Acceptance Rates

Overall Acceptance Rate 1,770 of 5,499 submissions, 32%

Upcoming Conference

DAC '25
62nd ACM/IEEE Design Automation Conference
June 22 - 26, 2025
San Francisco , CA , USA

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)98
  • Downloads (Last 6 weeks)5
Reflects downloads up to 30 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2025)Physically Secure Logic Locking With Nanomagnet LogicIEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems10.1109/TCAD.2024.343436244:1(105-118)Online publication date: Jan-2025
  • (2024)CRLock: A SAT and FALL Attacks Resistant Logic Locking Method for Controller at Register Transfer LevelIEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences10.1587/transfun.2023VLP0018E107.A:3(583-591)Online publication date: 1-Mar-2024
  • (2024)SFLL-AD: a self-adaptive and secure logic lockingIEICE Electronics Express10.1587/elex.20.2023055521:3(20230555-20230555)Online publication date: 10-Feb-2024
  • (2024)SRLL: Improving Security and Reliability with User-Defined Constraint-Aware Logic LockingACM Journal on Emerging Technologies in Computing Systems10.1145/3709139Online publication date: 23-Dec-2024
  • (2024)PROTECTS: Progressive Rtl Obfuscation with ThrEshold Control Technique during architectural SynthesisACM Transactions on Design Automation of Electronic Systems10.1145/370103230:1(1-34)Online publication date: 17-Oct-2024
  • (2024)Removal of SAT-Hard Instances in Logic Obfuscation Through Inference of FunctionalityACM Transactions on Design Automation of Electronic Systems10.1145/367490329:4(1-23)Online publication date: 25-Jun-2024
  • (2024)Evaluating the Robustness of Large scale eFPGA-based Hardware Redaction2024 37th International Conference on VLSI Design and 2024 23rd International Conference on Embedded Systems (VLSID)10.1109/VLSID60093.2024.00092(517-522)Online publication date: 6-Jan-2024
  • (2024)CAD Tools Pathway in Hardware Security2024 37th International Conference on VLSI Design and 2024 23rd International Conference on Embedded Systems (VLSID)10.1109/VLSID60093.2024.00063(342-347)Online publication date: 6-Jan-2024
  • (2024)Secure key exchange protocol and storage of logic locking key2024 28th International Symposium on VLSI Design and Test (VDAT)10.1109/VDAT63601.2024.10705695(1-6)Online publication date: 1-Sep-2024
  • (2024)IOLock: An Input/Output Locking Scheme for Protection Against Reverse Engineering AttacksIEEE Transactions on Very Large Scale Integration (VLSI) Systems10.1109/TVLSI.2023.333731032:2(347-360)Online publication date: 1-Feb-2024
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media