TY - GEN
T1 - Security analysis of logic obfuscation
AU - Rajendran, Jeyavijayan
AU - Pino, Youngok
AU - Sinanoglu, Ozgur
AU - Karri, Ramesh
PY - 2012
Y1 - 2012
N2 - Due to globalization of Integrated Circuit (IC) design flow, rogue elements in the supply chain can pirate ICs, overbuild ICs, and insert hardware trojans. EPIC [1] obfuscates the design by randomly inserting additional gates; only a correct key makes the design to produce correct outputs. We demonstrate that an attacker can decipher the obfuscated netlist, in a time linear to the number of keys, by sensitizing the key values to the output. We then develop techniques to fix this vulnerability and make obfuscation truly exponential in the number of inserted keys.
AB - Due to globalization of Integrated Circuit (IC) design flow, rogue elements in the supply chain can pirate ICs, overbuild ICs, and insert hardware trojans. EPIC [1] obfuscates the design by randomly inserting additional gates; only a correct key makes the design to produce correct outputs. We demonstrate that an attacker can decipher the obfuscated netlist, in a time linear to the number of keys, by sensitizing the key values to the output. We then develop techniques to fix this vulnerability and make obfuscation truly exponential in the number of inserted keys.
KW - IP protection
KW - logic obfuscation
UR - http://www.scopus.com/inward/record.url?scp=84863542083&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84863542083&partnerID=8YFLogxK
U2 - 10.1145/2228360.2228377
DO - 10.1145/2228360.2228377
M3 - Conference contribution
AN - SCOPUS:84863542083
SN - 9781450311991
T3 - Proceedings - Design Automation Conference
SP - 83
EP - 89
BT - Proceedings of the 49th Annual Design Automation Conference, DAC '12
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 49th Annual Design Automation Conference, DAC '12
Y2 - 3 June 2012 through 7 June 2012
ER -