Circuit Camouflage Integration for Hardware IP Protection

被引:72
|
作者
Cocchi, Ronald P. [1 ]
Baukus, James P. [1 ]
Chow, Lap Wai [1 ]
Wang, Bryan J. [1 ]
机构
[1] SypherMedia Int Inc, Westminster, CA 92683 USA
关键词
Security; Design; Camouflage; Obfuscation; Reverse Engineering; Anti-Cloning; Anti-Counterfeit; Anti-Tamper; Anti-Trojan;
D O I
10.1145/2593069.2602554
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Circuit camouflage technologies can be integrated into standard logic cell developments using traditional CAD tools. Camouflaged logic cells are integrated into a typical design flow using standard front end and back end models. Camouflaged logic cells obfuscate a circuit's function by introducing subtle cell design changes at the GDS level. The logic function of a camouflaged logic cell is extremely difficult to determine through silicon imaging analysis preventing netlist extraction, clones and counterfeits. The application of circuit camouflage as part of a customer's design flow can protect hardware IP from reverse engineering. Camouflage fill techniques further inhibit Trojan circuit insertion by completely filling the design with realistic circuitry that does not affect the primary design function. All unused silicon appears to be functional circuitry, so an attacker cannot find space to insert a Trojan circuit. The integration of circuit camouflage techniques is compatible with standard chip design flows and EDA tools, and ICs using such techniques have been successfully employed in high-attack commercial and government segments. Protected under issued and pending patents.
引用
收藏
页数:5
相关论文
共 50 条
  • [1] Hardware/software IP protection
    Dalpasso, M
    Bogliolo, A
    Benini, L
    37TH DESIGN AUTOMATION CONFERENCE, PROCEEDINGS 2000, 2000, : 593 - 596
  • [2] Hardware Obfuscation for IP Protection of DSP Applications
    Naveenkumar, R.
    Sivamangai, N. M.
    Napolean, A.
    Nissi, G. Akashraj
    JOURNAL OF ELECTRONIC TESTING-THEORY AND APPLICATIONS, 2022, 38 (01): : 9 - 20
  • [3] Comparative Analysis of Hardware Obfuscation for IP Protection
    Amir, Sarah
    Shakya, Bicky
    Forte, Domenic
    Tehranipoor, Mark
    Bhunia, Swarup
    PROCEEDINGS OF THE GREAT LAKES SYMPOSIUM ON VLSI 2017 (GLSVLSI' 17), 2017, : 363 - 368
  • [4] Hardware Obfuscation for IP Protection of DSP Applications
    Naveenkumar R
    N.M. Sivamangai
    Napolean A
    G. Akashraj Nissi
    Journal of Electronic Testing, 2022, 38 : 9 - 20
  • [5] Design and Integration Challenges of Building Security Hardware IP
    Wachs, Megan
    Ip, Daniel
    2015 52ND ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2015,
  • [6] On automating delayered IC analysis for hardware IP protection
    Sarkar, Esha
    Maniatakos, Michail
    INTERNATIONAL CONFERENCE ON OMNI-LAYER INTELLIGENT SYSTEMS (COINS), 2019, : 205 - 210
  • [7] On automating delayered IC analysis for hardware IP protection
    Sarkar, Esha
    Maniatakos, Michail
    ACM International Conference Proceeding Series, 2019, Part F148162 : 205 - 210
  • [8] Hardware IP Protection Using Logic Encryption and Watermarking
    Karmakar, Rajit
    Chattopadhyay, Santanu
    2020 IEEE INTERNATIONAL TEST CONFERENCE (ITC), 2020,
  • [9] A comprehensive hardware/software infrastructure for IP cores design protection
    Colombier, Brice
    Bossuet, Lilian
    Mureddu, Ugo
    Hely, David
    2017 INTERNATIONAL CONFERENCE ON FIELD PROGRAMMABLE TECHNOLOGY (ICFPT), 2017, : 263 - 266
  • [10] Hardware IP Protection Through Gate-level Obfuscation
    Li, Dongfang
    Liu, Wenchao
    Zou, Xuecheng
    Liu, Zhenglin
    2015 14TH INTERNATIONAL CONFERENCE ON COMPUTER-AIDED DESIGN AND COMPUTER GRAPHICS (CAD/GRAPHICS), 2015, : 186 - 193