asic design protection against reverse engineering during the fabrication process using automatic netlist obfuscation design flow

نویسندگان

sh. zamanzadeh

computer science and engineering department, shahid beheshti university, tehran, iran a. jahanian

computer science and engineering department, shahid beheshti university, tehran, iran

چکیده

fab-less business model in semiconductor industry has led to serious concerns about trustworthy hardware. in untrusted foundries and manufacturing companies, submitted layout may be analyzed and reverse engineered to steal the information of a design or insert malicious trojans. understanding the netlist topology is the ultimate goal of the reverse engineering process. in this paper, we propose a netlist encryption mechanism to hide the interconnect topology inside an ic. moreover, new special standard cells (wire scrambling cells) are designed to play the role of netlist encryption. furthermore, a design ow is proposed to insert the ws-cells inside the netlist with the aim of maximum obfuscation and minimum overhead. it is worth noting that this mechanism is fully automated with no need to detail information of the functionality and structure of the design. our proposed mechanism is implemented in an academic physical design framework (educad). experimental results show that reverse engineering can be hindered considerably in cost of negligible overheads by 23% in area, 3.25% in delay and 14.5% in total wire length. reverse engineering is evaluated by brute-force attack, and the learned information is 0% and the hamming distance is approximately 50%.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

ASIC design protection against reverse engineering during the fabrication process using automatic netlist obfuscation design flow

Fab-less business model in semiconductor industry has led to serious concerns about trustworthy hardware. In untrusted foundries and manufacturing companies, submitted layout may be analyzed and reverse engineered to steal the information of a design or insert malicious Trojans. Understanding the netlist topology is the ultimate goal of the reverse engineering process. In this paper, we propose...

متن کامل

ASICDesign Protection against Reverse Engineering during the Fabrication Process usingAutomatic Netlist ObfuscationDesign Flow

Fab-less business model in semiconductor industry has led to serious concerns about trustworthy hardware. In untrusted foundries and manufacturing companies, submitted layout may be analyzed and reverse engineered to steal the information of a design or insert malicious Trojans. Understanding the netlist topology is the ultimate goal of the reverse engineering process. In this paper, we propose...

متن کامل

using chip master planning in automatic asic design flow to improve performance and buffer resource management

modern integrated circuits consist of millions of standard cells and routing paths. in nano-scale designs, mis-prediction is a dominant problem that may diminish the quality of physical design algorithms or even result in the disruption of the convergence of the design cycle. in this paper, a new planning methodology is presented in which a master-plan of the chip is constructed at the early le...

متن کامل

design and fabrication of automatic sheep feeder

in nutritional experiments the animals are kept in metabolic cage and are fed according to the planned interval times. a machine was designed and fabricated to feed the sheep every one or two hours. the machine operates with 220 volts electricity and the feed storing capacity is designed for three days feeding. the weight of sheep and type of feed determines the amount of feed required. by chan...

متن کامل

Code Obfuscation against Static and Dynamic Reverse Engineering

The process of reverse engineering allows attackers to understand the behavior of software and extract proprietary algorithms and data structures (e.g. cryptographic keys) from it. Code obfuscation is frequently employed to mitigate this risk. However, while most of today’s obfuscation methods are targeted against static reverse engineering, where the attacker analyzes the code without actually...

متن کامل

Security Against Hardware Trojan Attacks Using Key-Based Design Obfuscation

Malicious modification of hardware in untrusted fabrication facilities, referred to as hardware Trojan, has emerged as a major security concern. Comprehensive detection of these Trojans during postmanufacturing test has been shown to be extremely difficult. Hence, it is important to develop design techniques that provide effective countermeasures against hardware Trojans by either preventing Tr...

متن کامل

منابع من

با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید


عنوان ژورنال:
isecure, the isc international journal of information security

جلد ۸، شماره ۲، صفحات ۸۷-۹۸

میزبانی شده توسط پلتفرم ابری doprax.com

copyright © 2015-2023