TY - GEN
T1 - Security analysis of integrated circuit camouflaging
AU - Rajendran, Jeyavijayan
AU - Sam, Michael
AU - Sinanoglu, Ozgur
AU - Karri, Ramesh
PY - 2013
Y1 - 2013
N2 - Camouflaging is a layout-level technique that hampers an attacker from reverse engineering by introducing, in one embodiment, dummy contacts into the layout. By using a mix of real and dummy contacts, one can camouflage a standard cell whose functionality can be one of many. If an attacker cannot resolve the functionality of a camouflaged gate, he/she will extract an incorrect netlist. In this paper, we analyze the feasibility of identifying the functionality of camouflaged gates. We also propose techniques to make the dummy contact-based IC camouflaging technique resilient to reverse engineering. Furthermore, we judiciously select gates to camouflage by using techniques which ensure that the outputs of the extracted netlist are controllably corrupted. The techniques leverage IC testing principles such as justification and sensitization. The proposed techniques are evaluated using ISCAS benchmark circuits and OpenSparc T1 microprocessor controllers.
AB - Camouflaging is a layout-level technique that hampers an attacker from reverse engineering by introducing, in one embodiment, dummy contacts into the layout. By using a mix of real and dummy contacts, one can camouflage a standard cell whose functionality can be one of many. If an attacker cannot resolve the functionality of a camouflaged gate, he/she will extract an incorrect netlist. In this paper, we analyze the feasibility of identifying the functionality of camouflaged gates. We also propose techniques to make the dummy contact-based IC camouflaging technique resilient to reverse engineering. Furthermore, we judiciously select gates to camouflage by using techniques which ensure that the outputs of the extracted netlist are controllably corrupted. The techniques leverage IC testing principles such as justification and sensitization. The proposed techniques are evaluated using ISCAS benchmark circuits and OpenSparc T1 microprocessor controllers.
KW - ic camouflaging
KW - ic reverse engineering
KW - ip piracy
KW - ip protection
UR - http://www.scopus.com/inward/record.url?scp=84889058172&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84889058172&partnerID=8YFLogxK
U2 - 10.1145/2508859.2516656
DO - 10.1145/2508859.2516656
M3 - Conference contribution
AN - SCOPUS:84889058172
SN - 9781450324779
T3 - Proceedings of the ACM Conference on Computer and Communications Security
SP - 709
EP - 720
BT - CCS 2013 - Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security
T2 - 2013 ACM SIGSAC Conference on Computer and Communications Security, CCS 2013
Y2 - 4 November 2013 through 8 November 2013
ER -