Spear and Shield: Evolution of Integrated Circuit Camouflaging

来源 :计算机科学技术学报(英文版) | 被引量 : 0次 | 上传用户:lwhssg
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
Intellectual property (IP) protection is one of the hardcore problems in hardware security. Semiconductor industry still lacks effective and proactive defense to shield IPs from reverse engineering (RE) based attacks. Integrated circuit (IC) camouflaging technique fills this gap by replacing some conventional logic gates in the IPs with specially designed logic cells (called camouflaged gates) without changing the functions of the IPs. The camouflaged gates can perform different logic functions while maintaining an identical look to RE attackers, thus preventing them from obtaining the layout information of the IP directly from RE tools. Since it was first proposed in 2012, circuit camouflaging has become one of the hottest research topics in hardware security focusing on two fundamental problems. How to choose the types of camouflaged gates and decide where to insert them in order to simultaneously minimize the performance overhead and optimize the RE complexity? How can an attacker de-camouflage a camouflaged circuit and complete the RE attack? In this article, we review the evolution of circuit camouflaging through this spear and shield race. First, we introduce the design methods of four different kinds of camouflaged cells based on true/dummy contacts, static random access memory (SRAM), doping, and emerging devices, respectively. Then we elaborate four representative de-camouflaging attacks: brute force attack, IC testing based attack, satisfiability-based (SAT-based) attack, and the circuit partition based attack, and the corresponding countermeasures: clique-based camouflaging, CamoPerturb, AND-tree camouflaging, and equivalent class based camouflaging, respectively. We argue that the current research efforts should be on reducing overhead introduced by circuit camouflaging and defeating de-camouflaging attacks. We point out that exploring features of emerging devices could be a promising direction. Finally, as a complement to circuit camouflaging, we conclude with a brief review of other state-of-the-art IP protection techniques.
其他文献
目的 比较健康人和淋巴瘤患者外周血中Th17与Treg的水平,以及良性反应性淋巴结和淋巴瘤患者的淋巴结中Th17与Treg的水平,探讨淋巴瘤患者是否存在Th17/Treg比例失衡.方法 收集
期刊
目的掌握珠海市户籍人群死亡水平及流行特征。方法按照国际疾病分类ICD-10根本死因分类要求,对2009-2010年珠海市户籍人群死亡病例开展死因回顾性调查,分析珠海市户籍人群主
目的本研究比较了多种可能适用于生食水产鱼肉中诺如病毒(No V)的提取方法。方法人工污染GII型No V三文鱼肉样品,通过病毒洗脱、浓缩、核酸提取,以及实时荧光定量反转录-聚合
请下载后查看,本文暂不支持在线获取查看简介。 Please download to view, this article does not support online access to view profile.
期刊
目的初步探讨双酚A对小鼠心脏组织的损伤作用。方法 50只健康昆明(KM)小鼠,按体重随机分为5组,每组10只,雌雄各半。剂量组分别给予2.4、24、240、480 mg/kg双酚A灌胃染毒,对
故障现象 蜂鸣器始终鸣叫报警 ,烘干不加温 ,驱动马达始终运转。故障分析与检修 机器通电即出现报警信号且鸣叫不止 ,驱动马达经 3min延时仍然工作 ,烘干温度加不上去。观
期刊
元月渔闲人不闲,清池修坝做在前;挖去淤泥除杂草,干池消毒灭病源。二月春和晴朗天,投放苗种应壮健;合理混养和密养,科学养殖效益翻。三月春暖升水温,鱼儿开口把食喂;投饵施肥有原则,量
期刊
期刊