skip to main content
10.1145/2966986.2967065guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
research-article

Provably secure camouflaging strategy for IC protection

Authors Info & Claims
Published:07 November 2016Publication History

ABSTRACT

The advancing of reverse engineering techniques has complicated the efforts in intellectual property protection. Proactive methods have been developed recently, among which layout-level IC camouflaging is the leading example. However, existing camouflaging methods are rarely supported by provably secure criteria, which further leads to over-estimation of the security level when countering the latest de-camouflaging attacks, e.g., the SAT-based attack. In this paper, a quantitative security criterion is proposed for de-camouflaging complexity measurements and formally analyzed through the demonstration of the equivalence between the existing de-camouflaging strategy and the active learning scheme. Supported by the new security criterion, two novel camouflaging techniques are proposed, the low-overhead camouflaging cell library and the AND-tree structure, to help achieve exponentially increasing security levels at the cost of linearly increasing performance overhead on the circuit under protection. A provably secure camouflaging framework is then developed by combining these two techniques. Experimental results using the security criterion show that the camouflaged circuits with the proposed framework are of high resilience against the SAT-based attack with negligible performance overhead.

References

  1. [1].Jin Yier. Introduction to hardware security. Electronics, 2015.Google ScholarGoogle Scholar
  2. [2].Torrance Randy and James Dick. The state-of-the-art in semiconductor reverse engineering. In DAC, 2011.Google ScholarGoogle Scholar
  3. [3].Chipwork. http://ww.chipworks.com/.Google ScholarGoogle Scholar
  4. [4].Becker Georg T, Regazzoni Francesco, Paar Christof, and Burleson Wayne P. Stealthy dopant-level hardware trojans: extended version. Journal of Cryptographic Engineering, 4 (1):1931, 2014.Google ScholarGoogle ScholarCross RefCross Ref
  5. [5].Chow Lap-Wai, Clark William M, and Baukus James P. Covert transformation of transistor properties as a circuit protection method, May 15 2007. US Patent 7, 217,977.Google ScholarGoogle Scholar
  6. [6].Chow Lap-Wai, Baukus James P, and Clark William M. Integrated circuits protected against reverse engineering and method for fabricating the same using an apparent metal contact line terminating on field oxide, November 13 2007. US Patent 7, 294,935.Google ScholarGoogle Scholar
  7. [7].Rajendran Jeyavijayan, Sam Michael, Sinanoglu Ozgur, and Karri Ramesh. Security analysis of integrated circuit camouflaging. In CCS, 2013.Google ScholarGoogle Scholar
  8. [8].Shweta Malik, Georg T Becker, Paar Christof, and Wayne P Burleson. Development of a layout-level hardware obfuscation tool. In ISVLSI, 2015.Google ScholarGoogle Scholar
  9. [9].Iyengar Anirudh and Ghosh Swaroop. Threshold voltage-defined switches for programmable gates. arXiv preprint arXiv:1512.01581, 2015.Google ScholarGoogle Scholar
  10. [10].Lee Yu-Wei and Touba Nur A. Improving logic obfuscation via logic cone analysis. In LATS, 2015.Google ScholarGoogle Scholar
  11. [11].El Massad Mohamed, Garg Siddharth, and Tripunitara Mahesh V.. Integrated circuit (IC) decamouflaging: Reverse engineering camouflaged ICs within minutes. In NDSS, 2015.Google ScholarGoogle Scholar
  12. [12].Liu Duo, Yu Cunxi, Zhang Xiangyu, and Holcomb Daniel E. Oracle-guided incremental sat solving to reverse engineer camouflaged logic circuits. In DATE, 2016.Google ScholarGoogle Scholar
  13. [13].Subramanyan Pramod, Ray Sayak, and Malik Sharad. Evaluating the security of logic encryption algorithms. In HOST, 2015.Google ScholarGoogle Scholar
  14. [14].Dasgupta Sanjoy and Langford John. A tutorial on active learning. In ICML, 2009.Google ScholarGoogle Scholar
  15. [15].Cohn David, Atlas Les, and Ladner Richard. Improving generalization with active learning. Machine Learning, 1994.Google ScholarGoogle Scholar
  16. [16].Hanneke Steve. A bound on the label complexity of agnostic active learning. In ICML, 2007.Google ScholarGoogle Scholar
  17. [17].Rajendran Jeyavijayan, Sinanoglu Ozgur, and Karri Ramesh. Vlsi testing based security metric for ic camouflaging. In ITC, 2013.Google ScholarGoogle Scholar
  18. [18].Wiener Roni. An Algorithm for Learning Boolean Functions for Dynamic Power Reduction. PhD thesis, University Of Haifa, 2007.Google ScholarGoogle Scholar
  19. [19].NanGate FreePDK45 Generic Open Cell Library. http://www.si2.org/openeda.si2.org/projects/nangatelib, 2008.Google ScholarGoogle Scholar
  20. [20].Mentor Graphics. Calibre verification user's manual, 2008.Google ScholarGoogle Scholar
  21. [21].Predictive Technology Model ver. 2.1. http://ptm.asu.edu, 2008.Google ScholarGoogle Scholar
  22. [22].Goldberg Evgueni, Prasad Mukul, and Brayton Robert. Using sat for combinational equivalence checking. In DATE, 2001.Google ScholarGoogle Scholar
  23. [23].Kullback Solomon. Information theory and statistics. Courier Corporation, 1968.Google ScholarGoogle Scholar
  24. [24].Synopsys PrimeTime. http://www.synopsys.com.Google ScholarGoogle Scholar
  25. [25].Brglez Franc, Bryan David, and Koźmiński Krzysztof. Combinational profiles of sequential benchmark circuits. In ISCAS, 1989.Google ScholarGoogle Scholar
  26. [26].Yang S.. Logic synthesis and optimization benchmarks user guide: Version 3.0. Technical report, MCNC Technical Report, 1991.Google ScholarGoogle Scholar

Index Terms

  1. Provably secure camouflaging strategy for IC protection
        Index terms have been assigned to the content through auto-classification.

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image Guide Proceedings
          2016 IEEE/ACM International Conference on Computer-Aided Design (ICCAD)
          Nov 2016
          946 pages

          Copyright © 2016

          Publisher

          IEEE Press

          Publication History

          • Published: 7 November 2016

          Permissions

          Request permissions about this article.

          Request Permissions

          Qualifiers

          • research-article