Security analysis of logic obfuscation

Due to globalization of Integrated Circuit (IC) design flow, rogue elements in the supply chain can pirate ICs, overbuild ICs, and insert hardware trojans. EPIC [1] obfuscates the design by randomly inserting additional gates; only a correct key makes the design to produce correct outputs. We demons...

Full description

Saved in:
Bibliographic Details
Published inDAC Design Automation Conference 2012 pp. 83 - 89
Main Authors Rajendran, Jeyavijayan, Pino, Youngok, Sinanoglu, Ozgur, Karri, Ramesh
Format Conference Proceeding
LanguageEnglish
Published New York, NY, USA ACM 03.06.2012
IEEE
SeriesACM Conferences
Subjects
Online AccessGet full text
ISBN1450311997
9781450311991
ISSN0738-100X
DOI10.1145/2228360.2228377

Cover

More Information
Summary:Due to globalization of Integrated Circuit (IC) design flow, rogue elements in the supply chain can pirate ICs, overbuild ICs, and insert hardware trojans. EPIC [1] obfuscates the design by randomly inserting additional gates; only a correct key makes the design to produce correct outputs. We demonstrate that an attacker can decipher the obfuscated netlist, in a time linear to the number of keys, by sensitizing the key values to the output. We then develop techniques to fix this vulnerability and make obfuscation truly exponential in the number of inserted keys.
ISBN:1450311997
9781450311991
ISSN:0738-100X
DOI:10.1145/2228360.2228377