Circuit Camouflage Integration for Hardware IP Protection

被引:72
|
作者
Cocchi, Ronald P. [1 ]
Baukus, James P. [1 ]
Chow, Lap Wai [1 ]
Wang, Bryan J. [1 ]
机构
[1] SypherMedia Int Inc, Westminster, CA 92683 USA
关键词
Security; Design; Camouflage; Obfuscation; Reverse Engineering; Anti-Cloning; Anti-Counterfeit; Anti-Tamper; Anti-Trojan;
D O I
10.1145/2593069.2602554
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Circuit camouflage technologies can be integrated into standard logic cell developments using traditional CAD tools. Camouflaged logic cells are integrated into a typical design flow using standard front end and back end models. Camouflaged logic cells obfuscate a circuit's function by introducing subtle cell design changes at the GDS level. The logic function of a camouflaged logic cell is extremely difficult to determine through silicon imaging analysis preventing netlist extraction, clones and counterfeits. The application of circuit camouflage as part of a customer's design flow can protect hardware IP from reverse engineering. Camouflage fill techniques further inhibit Trojan circuit insertion by completely filling the design with realistic circuitry that does not affect the primary design function. All unused silicon appears to be functional circuitry, so an attacker cannot find space to insert a Trojan circuit. The integration of circuit camouflage techniques is compatible with standard chip design flows and EDA tools, and ICs using such techniques have been successfully employed in high-attack commercial and government segments. Protected under issued and pending patents.
引用
收藏
页数:5
相关论文
共 50 条
  • [41] A software protection method based on instruction camouflage
    Kanzaki, Y
    Monden, A
    Nakamura, M
    Matsumoto, K
    ELECTRONICS AND COMMUNICATIONS IN JAPAN PART III-FUNDAMENTAL ELECTRONIC SCIENCE, 2006, 89 (01): : 47 - 59
  • [42] Design of Hardware IP Core Security Protection Based on Multi-Level Co-obfuscation
    Zhang Huihong
    Li Jing
    Wu Qiufeng
    Zhang Yuejun
    Wang Pengjun
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2021, 43 (09) : 2458 - 2465
  • [43] Security-Aware 2.5D Integrated Circuit Design Flow Against Hardware IP Piracy
    Xie Y.
    Bao C.
    Srivastava A.
    Computer, 2017, 50 (05): : 62 - 71
  • [44] Security-Aware 2.5D Integrated Circuit Design Flow Against Hardware IP Piracy
    Xie, Yang
    Bao, Chongxi
    Srivastava, Ankur
    COMPUTER, 2017, 50 (05) : 62 - 71
  • [45] Hardware Trojans Inspired IP Watermarks
    Shayan, Mohammed
    Basu, Kanad
    Karri, Ramesh
    IEEE DESIGN & TEST, 2019, 36 (06) : 72 - 79
  • [46] Novel Census Transform Hardware IP
    Reghunath, Anish
    Mody, Mihir
    Sanghvi, Hetul
    Ankur
    Proceedings of the IEEE International Conference on VLSI Design, 2021, 2021-February : 13 - 16
  • [47] Hardware/Firmware verification of graphic IP
    Romain, Kamdem
    RSP 2007: 18th IEEE/IFIP International Workshop on Rapid System Prototyping, Proceedings, 2007, : 48 - 53
  • [48] Novel Census Transform Hardware IP
    Reghunath, Anish
    Mody, Mihir
    Sanghvi, Hetul
    Ankur
    2021 34TH INTERNATIONAL CONFERENCE ON VLSI DESIGN AND 2021 20TH INTERNATIONAL CONFERENCE ON EMBEDDED SYSTEMS (VLSID & ES 2021), 2021, : 13 - 16
  • [49] Development of TCP/IP processing hardware
    Uchida, Tomohisa
    Tanaka, Manobu
    2006 IEEE NUCLEAR SCIENCE SYMPOSIUM CONFERENCE RECORD, VOL 1-6, 2006, : 1411 - 1414
  • [50] Artificial Neuron Hardware IP Verification
    Teo, Sje Yin
    Ong, Soon Ee
    2020 IEEE 29TH ASIAN TEST SYMPOSIUM (ATS), 2020, : 82 - 83