Identification of synthesis approaches for IP/IC piracy of reversible circuits

Samah Mohamed Saeed, Nithin Mahendran, Alwin Zulehner, Robert Wille, Ramesh Karri

Research output: Contribution to journalArticlepeer-review

Abstract

Reversible circuits employ a computational paradigm that is beneficial for several applications, including the design of encoding and decoding devices, low-power design, and emerging applications in quantum computation. However, similarly to conventional logic, reversible circuits are expected to be subject to Intellectual Property/Integrated Circuit piracy. To counteract such attacks, an understanding of how to identify the target function from a reversible circuit is a crucial first step. In contrast to conventional logic, the target function is (implicitly or explicitly) embedded into the reversible circuit. Numerous synthesis approaches have been proposed for this embedding task. To recover the target function embedded in a reversible circuit, one needs to know what synthesis approach has been used to embed the circuit. We propose a machine-learning-based scheme to determine the used reversible synthesis approach based on the telltale signs it leaves in the synthesized reversible circuit. We study the impact of optimizing the synthesis approaches on the telltale signs that they leave. Our analysis shows that the synthesis approaches can be determined in the vast majority of cases even if optimized versions of the synthesis approaches are used.

Original languageEnglish (US)
Article number23
JournalACM Journal on Emerging Technologies in Computing Systems
Volume15
Issue number3
DOIs
StatePublished - May 2019

Keywords

  • BDD
  • ESOP
  • IP/IC piracy
  • Machine-learning-based scheme
  • QMDD
  • Reversible logic
  • Security
  • TBS

ASJC Scopus subject areas

  • Software
  • Hardware and Architecture
  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'Identification of synthesis approaches for IP/IC piracy of reversible circuits'. Together they form a unique fingerprint.

Cite this