2021
DOI: 10.3389/fdata.2021.608286
|View full text |Cite
|
Sign up to set email alerts
|

Deep Graph Learning for Circuit Deobfuscation

Abstract: Circuit obfuscation is a recently proposed defense mechanism to protect the intellectual property (IP) of digital integrated circuits (ICs) from reverse engineering. There have been effective schemes, such as satisfiability (SAT)-checking based attacks that can potentially decrypt obfuscated circuits, which is called deobfuscation. Deobfuscation runtime could be days or years, depending on the layouts of the obfuscated ICs. Hence, accurately pre-estimating the deobfuscation runtime within a reasonable amount o… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 33 publications
0
2
0
Order By: Relevance
“…Moreover, this study can be further developed to for the purpose of linking finite element modelling software in AI assisted design of magnetic components for the purpose of optimal component values/shape design. Additionally, the proposed methodology has very high potential in circuit obfuscation and reverse engineering when it is required to identify/obscure circuit structure [80]. One idea works on the circuit side utilizing the GNN capability of learning the proper transformation function of the converter, i.e can obtain a mathematical transformation of every circuit component and eventually all circuit behavior.…”
Section: B) Switching Circuit Classifiermentioning
confidence: 99%
“…Moreover, this study can be further developed to for the purpose of linking finite element modelling software in AI assisted design of magnetic components for the purpose of optimal component values/shape design. Additionally, the proposed methodology has very high potential in circuit obfuscation and reverse engineering when it is required to identify/obscure circuit structure [80]. One idea works on the circuit side utilizing the GNN capability of learning the proper transformation function of the converter, i.e can obtain a mathematical transformation of every circuit component and eventually all circuit behavior.…”
Section: B) Switching Circuit Classifiermentioning
confidence: 99%
“…The hardware security discipline in recent years experienced a plethora of threats like the Malware attacks [1][2][3][4][5][6][7], Side-Channel Attacks [8][9][10][11], Hardware Trojan attacks [12], reverse engineering threats [13][14][15][16][17][18][19][20][21][22][23][24][25][26] and so on. I focus on the malware detection technique here along with some state-of-the-art works.…”
Section: Introduction To Malware Threatsmentioning
confidence: 99%