Circuit Camouflage Integration for Hardware IP Protection

被引:72
|
作者
Cocchi, Ronald P. [1 ]
Baukus, James P. [1 ]
Chow, Lap Wai [1 ]
Wang, Bryan J. [1 ]
机构
[1] SypherMedia Int Inc, Westminster, CA 92683 USA
关键词
Security; Design; Camouflage; Obfuscation; Reverse Engineering; Anti-Cloning; Anti-Counterfeit; Anti-Tamper; Anti-Trojan;
D O I
10.1145/2593069.2602554
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Circuit camouflage technologies can be integrated into standard logic cell developments using traditional CAD tools. Camouflaged logic cells are integrated into a typical design flow using standard front end and back end models. Camouflaged logic cells obfuscate a circuit's function by introducing subtle cell design changes at the GDS level. The logic function of a camouflaged logic cell is extremely difficult to determine through silicon imaging analysis preventing netlist extraction, clones and counterfeits. The application of circuit camouflage as part of a customer's design flow can protect hardware IP from reverse engineering. Camouflage fill techniques further inhibit Trojan circuit insertion by completely filling the design with realistic circuitry that does not affect the primary design function. All unused silicon appears to be functional circuitry, so an attacker cannot find space to insert a Trojan circuit. The integration of circuit camouflage techniques is compatible with standard chip design flows and EDA tools, and ICs using such techniques have been successfully employed in high-attack commercial and government segments. Protected under issued and pending patents.
引用
收藏
页数:5
相关论文
共 50 条
  • [31] Hardware obfuscation of AES IP core using combinational hardware Trojan circuit for secure data transmission in IoT applications
    Chhabra, Surbhi
    Lata, Kusum
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2022, 34 (21):
  • [32] Hardware obfuscation of AES IP core using combinational hardware Trojan circuit for secure data transmission in IoT applications
    Chhabra, Surbhi
    Lata, Kusum
    Concurrency and Computation: Practice and Experience, 2022, 34 (21):
  • [33] From Full-Custom to Gate-Array ASIC for Hardware IP Protection
    Kamali, Hadi Mardani
    17TH IEEE DALLAS CIRCUITS AND SYSTEMS CONFERENCE, DCAS 2024, 2024,
  • [34] Hardware obfuscation design of the RM logical camouflage gate
    Wu Q.
    Zhang Y.
    Wang P.
    Zhang H.
    Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2020, 47 (02): : 135 - 141
  • [35] IP protection
    EuroAsia Semicond., 2007, 4 (03):
  • [36] Hardware IP Protection against Confidentiality Attacks and Evolving Role of CAD Tool (Invited Paper)
    Bhunia, Swarup
    Das, Amitabh
    Fazzari, Saverio
    Kammler, Vivian
    Kehlet, David
    Rajendran, Jeyavijayan
    Srivastava, Ankur
    2022 IEEE/ACM INTERNATIONAL CONFERENCE ON COMPUTER AIDED DESIGN, ICCAD, 2022,
  • [37] Automatic Integration of Non-Bus Hardware IP into SoC-Platforms for Use by Software
    Guenzel, Robert
    EUC 2008: PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING, VOL 1, MAIN CONFERENCE, 2008, : 59 - 65
  • [38] RTL Hardware IP Protection Using Key-Based Control and Data Flow Obfuscation
    Chakraborty, Rajat Subhra
    Bhunia, Swarup
    23RD INTERNATIONAL CONFERENCE ON VLSI DESIGN, 2010, : 405 - 410
  • [39] TaintLock: Hardware IP Protection Against Oracle-Guided and Oracle-Reconstruction Attacks
    Talukdar, Jonti
    Chaudhuri, Arjun
    Ortega, Eduardo
    Chakrabarty, Krishnendu
    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2025, 44 (01) : 357 - 370
  • [40] Camouflage: Hardware-assisted CFI for the ARM Linux kernel
    Denis-Courmont, Remi
    Liljestrand, Hans
    Chinea, Carlos
    Ekberg, Jan-Erik
    PROCEEDINGS OF THE 2020 57TH ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2020,