TY - GEN
T1 - The need for declarative properties in digital IC security
AU - El Massad, Mohamed
AU - Imeson, Frank
AU - Garg, Siddharth
AU - Tripunitara, Mahesh
PY - 2017/5/10
Y1 - 2017/5/10
N2 - We emphasize the need to articulate precise, declarative properties in the context of securing Digital ICs. We do this by discussing two pieces of our work on securing Digital ICs. In one, we discuss a seemingly compelling approach to protecting Intellectual Property | IC camouaging. We demonstrate that an adversary can carry out a decamouaging attack, in practice, much more efficiently than previously thought. Underlying our attack is strong foundations: an identification of the computational-complexity of the problems an attacker faces, and how they can be addressed using off-the-shelf constraint solvers. We identify the lack of a precise characterization of 'security' in this context as an issue. In the other piece of work, we present an example of the articulation of such a security property for 3D IC technology, in the context of securing a supply-chain. The property is articulated declaratively, with explicit assumptions that underlie the threat model.
AB - We emphasize the need to articulate precise, declarative properties in the context of securing Digital ICs. We do this by discussing two pieces of our work on securing Digital ICs. In one, we discuss a seemingly compelling approach to protecting Intellectual Property | IC camouaging. We demonstrate that an adversary can carry out a decamouaging attack, in practice, much more efficiently than previously thought. Underlying our attack is strong foundations: an identification of the computational-complexity of the problems an attacker faces, and how they can be addressed using off-the-shelf constraint solvers. We identify the lack of a precise characterization of 'security' in this context as an issue. In the other piece of work, we present an example of the articulation of such a security property for 3D IC technology, in the context of securing a supply-chain. The property is articulated declaratively, with explicit assumptions that underlie the threat model.
KW - Computational complexity
KW - Declarative properties
UR - http://www.scopus.com/inward/record.url?scp=85021207179&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85021207179&partnerID=8YFLogxK
U2 - 10.1145/3060403.3066870
DO - 10.1145/3060403.3066870
M3 - Conference contribution
AN - SCOPUS:85021207179
T3 - Proceedings of the ACM Great Lakes Symposium on VLSI, GLSVLSI
SP - 333
EP - 338
BT - GLSVLSI 2017 - Proceedings of the Great Lakes Symposium on VLSI 2017
PB - Association for Computing Machinery
T2 - 27th Great Lakes Symposium on VLSI, GLSVLSI 2017
Y2 - 10 May 2017 through 12 May 2017
ER -