Proceedings of the International Symposium on Low Power Electronics and Design 2018
DOI: 10.1145/3218603.3218641
|View full text |Cite
|
Sign up to set email alerts
|

Threshold Defined Camouflaged Gates in 65nm Technology for Reverse Engineering Protection

Abstract: Due to the ever-increasing threat of Reverse Engineering (RE) of Intellectual Property (IP) for malicious gains, camouflaging of logic gates is becoming very important. In this paper, we present experimental demonstration of transistor threshold voltage-defined switch [2] based camouflaged logic gates that can hide six logic functionalities i.e. NAND, AND, NOR, OR, XOR and XNOR. The proposed gates can be used to design the IP, forcing an adversary to perform brute-force guess-and-verify of the underlying funct… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 10 publications
(4 citation statements)
references
References 15 publications
0
4
0
Order By: Relevance
“…In such a case, the carrier mobility reduction is significantly contrasted by the lower threshold voltage, which, in turn, lead to a propagation delay reduction. This behavior is expected to be much more evident when ROs are realized on FPGA platforms exploiting a massive usage of PT logic circuits [34], [35]. By transistor-level simulations performed by using a standard CMOS process technology, we investigated the effects of the coexistence of PT and static CMOS logic stages, typically occurring in the target platform.…”
Section: Temperature Sensitivitymentioning
confidence: 99%
“…In such a case, the carrier mobility reduction is significantly contrasted by the lower threshold voltage, which, in turn, lead to a propagation delay reduction. This behavior is expected to be much more evident when ROs are realized on FPGA platforms exploiting a massive usage of PT logic circuits [34], [35]. By transistor-level simulations performed by using a standard CMOS process technology, we investigated the effects of the coexistence of PT and static CMOS logic stages, typically occurring in the target platform.…”
Section: Temperature Sensitivitymentioning
confidence: 99%
“…Collantes et al [54] adopted domino logic to implement their TVCs. Recently, Iyengar et al [64] demonstrated two flavors of TVC in STMicroelectronics 65nm technology. In principle, TVC schemes offer better resilience than other LC schemes as regular etching and optical-imaging techniques are ineffective.…”
Section: Advanced Layout Camouflaging Schemesmentioning
confidence: 99%
“…Thus, there is motivation for developing countermeasures to SEM-based RE. To disrupt the attacker's ability to identify logic gates from SEM images, camouflaging techniques such as manipulating the threshold voltage [12], [13], [14] of transistors and dummy contacts [11] have been proposed. However, in these early camouflaging processes, the attacker knows which cells are camouflaged in the design.…”
Section: Introductionmentioning
confidence: 99%