Proceedings of the IEEE International Test Conference on Test: Faster, Better, Sooner
EPIC: ending piracy of integrated circuits
Proceedings of the conference on Design, automation and test in Europe
HARPOON: an obfuscation-based SoC design methodology for hardware protection
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems
Preventing IC Piracy Using Reconfigurable Logic Barriers
IEEE Design & Test
Security analysis of integrated circuit camouflaging
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
SEC'13 Proceedings of the 22nd USENIX conference on Security
Hardware security: threat models and metrics
Proceedings of the International Conference on Computer-Aided Design
Hi-index | 0.00 |
Due to globalization of Integrated Circuit (IC) design flow, rogue elements in the supply chain can pirate ICs, overbuild ICs, and insert hardware trojans. EPIC [1] obfuscates the design by randomly inserting additional gates; only a correct key makes the design to produce correct outputs. We demonstrate that an attacker can decipher the obfuscated netlist, in a time linear to the number of keys, by sensitizing the key values to the output. We then develop techniques to fix this vulnerability and make obfuscation truly exponential in the number of inserted keys.