Transforming between logic locking and IC camouflaging

Muhammad Yasin, Ozgur Sinanoglu

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

The globalization of IC design has resulted in security vulnerabilities and trust issues such as piracy, overbuilding, reverse engineering and Hardware Trojans. Logic locking and IC camouflaging are two techniques that help thwart piracy and reverse engineering attacks by making modifications at the netlist level and the layout level, respectively. In this paper, we analyze the similarities and differences among logic locking and IC camouflaging. We p resent methods to transformation camouflaged netlist to its security-equivalent logic locked netlist and vice versa. The proposed transformations enable the switch from one defense technique to the other, and assess and compare the effectiveness of the two techniques using the same set of analysis algorithms and tools.

Original languageEnglish (US)
Title of host publicationProceeding of 2015 10th International Design and Test Symposium, IDT 2015
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages1-4
Number of pages4
ISBN (Electronic)9781467399944
DOIs
StatePublished - Feb 1 2016
Event10th IEEE International Design and Test Symposium, IDT 2015 - Dead Sea, Amman, Jordan
Duration: Dec 14 2015Dec 16 2015

Publication series

NameProceeding of 2015 10th International Design and Test Symposium, IDT 2015

Other

Other10th IEEE International Design and Test Symposium, IDT 2015
CountryJordan
CityDead Sea, Amman
Period12/14/1512/16/15

ASJC Scopus subject areas

  • Hardware and Architecture
  • Electrical and Electronic Engineering
  • Safety, Risk, Reliability and Quality

Fingerprint Dive into the research topics of 'Transforming between logic locking and IC camouflaging'. Together they form a unique fingerprint.

Cite this