Identification of synthesis approaches for IP/IC piracy of reversible circuits

Samah Mohamed Saeed, Nithin Mahendran, Alwin Zulehner, Robert Wille, Ramesh Karri

Research output: Contribution to journalArticle

Abstract

Reversible circuits employ a computational paradigm that is beneficial for several applications, including the design of encoding and decoding devices, low-power design, and emerging applications in quantum computation. However, similarly to conventional logic, reversible circuits are expected to be subject to Intellectual Property/Integrated Circuit piracy. To counteract such attacks, an understanding of how to identify the target function from a reversible circuit is a crucial first step. In contrast to conventional logic, the target function is (implicitly or explicitly) embedded into the reversible circuit. Numerous synthesis approaches have been proposed for this embedding task. To recover the target function embedded in a reversible circuit, one needs to know what synthesis approach has been used to embed the circuit. We propose a machine-learning-based scheme to determine the used reversible synthesis approach based on the telltale signs it leaves in the synthesized reversible circuit. We study the impact of optimizing the synthesis approaches on the telltale signs that they leave. Our analysis shows that the synthesis approaches can be determined in the vast majority of cases even if optimized versions of the synthesis approaches are used.

Original languageEnglish (US)
Article number23
JournalACM Journal on Emerging Technologies in Computing Systems
Volume15
Issue number3
DOIs
StatePublished - May 1 2019

Fingerprint

Networks (circuits)
Quantum computers
Intellectual property
Integrated circuits
Decoding
Learning systems

Keywords

  • BDD
  • ESOP
  • IP/IC piracy
  • Machine-learning-based scheme
  • QMDD
  • Reversible logic
  • Security
  • TBS

ASJC Scopus subject areas

  • Software
  • Hardware and Architecture
  • Electrical and Electronic Engineering

Cite this

Identification of synthesis approaches for IP/IC piracy of reversible circuits. / Saeed, Samah Mohamed; Mahendran, Nithin; Zulehner, Alwin; Wille, Robert; Karri, Ramesh.

In: ACM Journal on Emerging Technologies in Computing Systems, Vol. 15, No. 3, 23, 01.05.2019.

Research output: Contribution to journalArticle

Saeed, Samah Mohamed ; Mahendran, Nithin ; Zulehner, Alwin ; Wille, Robert ; Karri, Ramesh. / Identification of synthesis approaches for IP/IC piracy of reversible circuits. In: ACM Journal on Emerging Technologies in Computing Systems. 2019 ; Vol. 15, No. 3.
@article{038048351810497f959d7e148df13cb0,
title = "Identification of synthesis approaches for IP/IC piracy of reversible circuits",
abstract = "Reversible circuits employ a computational paradigm that is beneficial for several applications, including the design of encoding and decoding devices, low-power design, and emerging applications in quantum computation. However, similarly to conventional logic, reversible circuits are expected to be subject to Intellectual Property/Integrated Circuit piracy. To counteract such attacks, an understanding of how to identify the target function from a reversible circuit is a crucial first step. In contrast to conventional logic, the target function is (implicitly or explicitly) embedded into the reversible circuit. Numerous synthesis approaches have been proposed for this embedding task. To recover the target function embedded in a reversible circuit, one needs to know what synthesis approach has been used to embed the circuit. We propose a machine-learning-based scheme to determine the used reversible synthesis approach based on the telltale signs it leaves in the synthesized reversible circuit. We study the impact of optimizing the synthesis approaches on the telltale signs that they leave. Our analysis shows that the synthesis approaches can be determined in the vast majority of cases even if optimized versions of the synthesis approaches are used.",
keywords = "BDD, ESOP, IP/IC piracy, Machine-learning-based scheme, QMDD, Reversible logic, Security, TBS",
author = "Saeed, {Samah Mohamed} and Nithin Mahendran and Alwin Zulehner and Robert Wille and Ramesh Karri",
year = "2019",
month = "5",
day = "1",
doi = "10.1145/3289392",
language = "English (US)",
volume = "15",
journal = "ACM Journal on Emerging Technologies in Computing Systems",
issn = "1550-4832",
publisher = "Association for Computing Machinery (ACM)",
number = "3",

}

TY - JOUR

T1 - Identification of synthesis approaches for IP/IC piracy of reversible circuits

AU - Saeed, Samah Mohamed

AU - Mahendran, Nithin

AU - Zulehner, Alwin

AU - Wille, Robert

AU - Karri, Ramesh

PY - 2019/5/1

Y1 - 2019/5/1

N2 - Reversible circuits employ a computational paradigm that is beneficial for several applications, including the design of encoding and decoding devices, low-power design, and emerging applications in quantum computation. However, similarly to conventional logic, reversible circuits are expected to be subject to Intellectual Property/Integrated Circuit piracy. To counteract such attacks, an understanding of how to identify the target function from a reversible circuit is a crucial first step. In contrast to conventional logic, the target function is (implicitly or explicitly) embedded into the reversible circuit. Numerous synthesis approaches have been proposed for this embedding task. To recover the target function embedded in a reversible circuit, one needs to know what synthesis approach has been used to embed the circuit. We propose a machine-learning-based scheme to determine the used reversible synthesis approach based on the telltale signs it leaves in the synthesized reversible circuit. We study the impact of optimizing the synthesis approaches on the telltale signs that they leave. Our analysis shows that the synthesis approaches can be determined in the vast majority of cases even if optimized versions of the synthesis approaches are used.

AB - Reversible circuits employ a computational paradigm that is beneficial for several applications, including the design of encoding and decoding devices, low-power design, and emerging applications in quantum computation. However, similarly to conventional logic, reversible circuits are expected to be subject to Intellectual Property/Integrated Circuit piracy. To counteract such attacks, an understanding of how to identify the target function from a reversible circuit is a crucial first step. In contrast to conventional logic, the target function is (implicitly or explicitly) embedded into the reversible circuit. Numerous synthesis approaches have been proposed for this embedding task. To recover the target function embedded in a reversible circuit, one needs to know what synthesis approach has been used to embed the circuit. We propose a machine-learning-based scheme to determine the used reversible synthesis approach based on the telltale signs it leaves in the synthesized reversible circuit. We study the impact of optimizing the synthesis approaches on the telltale signs that they leave. Our analysis shows that the synthesis approaches can be determined in the vast majority of cases even if optimized versions of the synthesis approaches are used.

KW - BDD

KW - ESOP

KW - IP/IC piracy

KW - Machine-learning-based scheme

KW - QMDD

KW - Reversible logic

KW - Security

KW - TBS

UR - http://www.scopus.com/inward/record.url?scp=85065768133&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85065768133&partnerID=8YFLogxK

U2 - 10.1145/3289392

DO - 10.1145/3289392

M3 - Article

AN - SCOPUS:85065768133

VL - 15

JO - ACM Journal on Emerging Technologies in Computing Systems

JF - ACM Journal on Emerging Technologies in Computing Systems

SN - 1550-4832

IS - 3

M1 - 23

ER -