Proceedings 2015 Network and Distributed System Security Symposium 2015
DOI: 10.14722/ndss.2015.23218
|View full text |Cite
|
Sign up to set email alerts
|

Integrated Circuit (IC) Decamouflaging: Reverse Engineering Camouflaged ICs within Minutes

Abstract: Circuit camouflaging is a recently proposed defense mechanism to protect digital integrated circuits (ICs) from reverse engineering attacks by using camouflaged gates, i.e., logic gates whose functionality cannot be precisely determined by the attacker. Recent work appears to establish that an attacker requires time that is exponential in the number of camouflaged gates to reverse engineer a circuit, if the gates that are camouflaged are chosen using a procedure proposed in that work. Consequently, it appears … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
96
0

Year Published

2016
2016
2020
2020

Publication Types

Select...
5
4
1

Relationship

0
10

Authors

Journals

citations
Cited by 151 publications
(100 citation statements)
references
References 16 publications
0
96
0
Order By: Relevance
“…SAT solving is used both for synthesizing new inputs that should be applied to the oracle, and is also used for deobfuscating the design once a sufficient set of input-output examples is obtained. For more details on this approach, we point interested readers to the work El Massad et al [62]; their work shows that the logic function of a circuit with 200 obfuscated gates, each capable of implementing NAND/NOR/XOR (3 200 possible logic functions), can be identified in less than an hour after observing just tens of input/output vectors [62]. Later work extends El Massad's attack using incremental SAT solvers for more efficient implementation [63].…”
Section: Obfuscation Countermeasures: Sat Solving To Assist Reversmentioning
confidence: 99%
“…SAT solving is used both for synthesizing new inputs that should be applied to the oracle, and is also used for deobfuscating the design once a sufficient set of input-output examples is obtained. For more details on this approach, we point interested readers to the work El Massad et al [62]; their work shows that the logic function of a circuit with 200 obfuscated gates, each capable of implementing NAND/NOR/XOR (3 200 possible logic functions), can be identified in less than an hour after observing just tens of input/output vectors [62]. Later work extends El Massad's attack using incremental SAT solvers for more efficient implementation [63].…”
Section: Obfuscation Countermeasures: Sat Solving To Assist Reversmentioning
confidence: 99%
“…Obfuscation and camouflaging are two effective techniques to thwart reverse-engineering security threats. More specifically, obfuscation inserts additional gates, states, or transitions into the hardware to hide the original functionality and implementation of the design Frey and Yu 2015;Zhang 2015], whereas camouflaging is a layout information hiding technique that prevents the extraction of netlists from the layout by inserting additional cells in empty spaces or making layouts of different gates look identical [Cocchi et al 2014;El Massad et al 2015;Karri et al 2015]. The overhead associated with obfuscation and camouflaging needs to be carefully analyzed so that the most cost effective technique can be selected to increase the hardware security.…”
Section: Maximizementioning
confidence: 99%
“…It is worth noting that the two reversed engineering attacks (propagated/isolated secret key [5] and SAT [23] attacks) assume that an attacker can get a functional IC from the market and obtain the encrypted chip by either IC design or reverse engineering in an untrusted foundry [5,23,36]. Therefore, an adversary can have access to the primary input-output pairs and can also reveal the structure of the circuit.…”
Section: Sat Based Attackmentioning
confidence: 99%