Security analysis of logic obfuscation Conference Paper uri icon

abstract

  • Due to globalization of Integrated Circuit (IC) design flow, rogue elements in the supply chain can pirate ICs, overbuild ICs, and insert hardware trojans. EPIC [1] obfuscates the design by randomly inserting additional gates; only a correct key makes the design to produce correct outputs. We demonstrate that an attacker can decipher the obfuscated netlist, in a time linear to the number of keys, by sensitizing the key values to the output. We then develop techniques to fix this vulnerability and make obfuscation truly exponential in the number of inserted keys. 2012 ACM.

name of conference

  • Proceedings of the 49th Annual Design Automation Conference on - DAC '12

published proceedings

  • 2014 51st ACM/EDAC/IEEE Design Automation Conference (DAC)

altmetric score

  • 6

author list (cited authors)

  • Rajendran, J., Pino, Y., Sinanoglu, O., & Karri, R.

citation count

  • 295

complete list of authors

  • Rajendran, Jeyavijayan||Pino, Youngok||Sinanoglu, Ozgur||Karri, Ramesh

publication date

  • January 1, 2012 11:11 AM