The SAT Attack on IC Camouflaging: Impact and Potential Countermeasures

Mohamed El Massad, Siddharth Garg, Mahesh V. Tripunitara

Research output: Contribution to journalArticlepeer-review

Abstract

Integrated circuit (IC) camouflaging is a promising defense against so-called IC extraction attacks that seek to reverse engineer the netlist of a packaged IC using delayering and imaging techniques. Camouflaging works by hiding the Boolean functionality of selected gates in the netlist from reverse engineering, albeit at the cost of increased gate area and power. The intuitive security claim then is that the attacker cannot infer the netlist's exact Boolean functionality. This paper describes a powerful class of attacks on IC camouflaging referred to as SAT attacks; the attacks use the input/output (I/O) behavior of a functional camouflaged IC along with the Boolean satisfiability (SAT)-based inference to reverse the Boolean functionalities of camouflaged gates. The SAT attack is rooted in a foundational complexity theory mindset and is shown to defeat defenses that previously claimed to secure against even the most determined adversaries. This paper then highlights the subsequent impact of the SAT attack in terms of new SAT-resilient defenses that emerged, their vulnerability to enhancements of the SAT attack, and implications of the attack on provably secure defense mechanisms.

Original languageEnglish (US)
Article number8755334
Pages (from-to)1577-1590
Number of pages14
JournalIEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems
Volume39
Issue number8
DOIs
StatePublished - Aug 2020

Keywords

  • Computer security
  • cryptography
  • electronic design automation
  • hardware

ASJC Scopus subject areas

  • Software
  • Computer Graphics and Computer-Aided Design
  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'The SAT Attack on IC Camouflaging: Impact and Potential Countermeasures'. Together they form a unique fingerprint.

Cite this