2020 IEEE International Symposium on Hardware Oriented Security and Trust (HOST) 2020
DOI: 10.1109/host45689.2020.9300256
|View full text |Cite
|
Sign up to set email alerts
|

Latch-Based Logic Locking

Abstract: Globalization of IC manufacturing has led to increased security concerns, notably IP theft. Several logic locking techniques have been developed for protecting designs, but they typically display very large overhead, and are generally susceptible to deciphering attacks. In this paper, we propose latch-based logic locking, which manipulates both the flow of data and logic in the design. This method converts an interconnected subset of existing flip-flops to pairs of latches with programmable phase. In tandem, d… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
5
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
3
1

Relationship

3
6

Authors

Journals

citations
Cited by 28 publications
(5 citation statements)
references
References 26 publications
0
5
0
Order By: Relevance
“…For the obfuscation of DSP circuits, a novel approach that uses high-level transformations, a key-based finite-state machine and a reconfigurator was introduced in [30]. The use of decoys in obfuscation has been utilized in [31], but in a manner that is not related to the IP itself, as the decoys are keyed gates. To make the reverse engineering of coefficients of an FIR filter harder for an enduser, adding input and output noises was proposed in [32].…”
Section: Related Workmentioning
confidence: 99%
“…For the obfuscation of DSP circuits, a novel approach that uses high-level transformations, a key-based finite-state machine and a reconfigurator was introduced in [30]. The use of decoys in obfuscation has been utilized in [31], but in a manner that is not related to the IP itself, as the decoys are keyed gates. To make the reverse engineering of coefficients of an FIR filter harder for an enduser, adding input and output noises was proposed in [32].…”
Section: Related Workmentioning
confidence: 99%
“…Countermeasures to secure an IC also apply to a malicious end-user that can be interested in reverse engineering a design. Noteworthy examples of countermeasures are Logic Locking [6]- [10], IC Camouflaging [11]- [13], Split Manufacturing [14], [15], and FPGA-like obfuscation approaches [16]- [24]. The latter style of obfuscation attempts to exploit an FPGA (or FPGA-like) fabric, where the functionality of the circuit is hidden by the configuration and the bitstream serves as a key to unlock the design.…”
Section: Introductionmentioning
confidence: 99%
“…Alongside the continuous miniaturization trend that ICs have benefited from for decades, new security threats have emerged and are now frequently studied. Among them, the theft of intellectual property (IP) has been the target of many studies [4,5,7,9,10,11,12].…”
Section: Introductionmentioning
confidence: 99%
“…Approaches anchored on partial trusted fabrication have been proposed [9] but have not been adopted by the industry. Logic locking [10] studies have received a fair amount of attention and many derivatives of the original concept have emerged [12]. However, powerful attacks against logic locking are continuously proposed.…”
Section: Introductionmentioning
confidence: 99%