2017 IEEE/ACM International Conference on Computer-Aided Design (ICCAD) 2017
DOI: 10.1109/iccad.2017.8203757
|View full text |Cite
|
Sign up to set email alerts
|

Reverse engineering camouflaged sequential circuits without scan access

Abstract: Integrated circuit (IC) camouflaging is a promising technique to protect the design of a chip from reverse engineering. However, recent work has shown that even camouflaged ICs can be reverse engineered from the observed input/output behaviour of a chip using SAT solvers. However, these so-called SAT attacks have so far targeted only camouflaged combinational circuits. For camouflaged sequential circuits, the SAT attack requires that the internal state of the circuit is controllable and observable via the scan… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
41
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 74 publications
(41 citation statements)
references
References 12 publications
0
41
0
Order By: Relevance
“…Bias PUF based scan [38] ScanSAT-resilient large circuits such as s38584 and b19 (even with a key-size of 128). For s38584, the only benchmark common to our and their work, the NSAA tool reportedly crashed [24]. As acknowledged in [24], NSAA is effective only if the ratio of the primary IOs to the SFFs is reasonably large.…”
Section: Comparison Against Nsaa [24]mentioning
confidence: 74%
See 3 more Smart Citations
“…Bias PUF based scan [38] ScanSAT-resilient large circuits such as s38584 and b19 (even with a key-size of 128). For s38584, the only benchmark common to our and their work, the NSAA tool reportedly crashed [24]. As acknowledged in [24], NSAA is effective only if the ratio of the primary IOs to the SFFs is reasonably large.…”
Section: Comparison Against Nsaa [24]mentioning
confidence: 74%
“…3 Most of the logic locking attacks, including the powerful SAT attack, assume full scan access to a working oracle. We note that there are a few exceptions, such as [24], that launch the attack without scan access; however, as explained further later, the effectiveness of such techniques is quite limited 2. A chip need not be functional to be tested for structural defects.…”
Section: The Sat Attackmentioning
confidence: 97%
See 2 more Smart Citations
“…Comparison with prior attacks. Previously, there has been an attack launched on camouflaged sequential circuits with restricted scan access [32]. To circumvent the blocked scan access, El Massad et al rely on model checker tools to find discriminating input sequences that can be applied through multiple capture cycles to observe the primary output.…”
Section: A Attack Resultsmentioning
confidence: 99%