2021
DOI: 10.1109/tcad.2020.3011662
|View full text |Cite
|
Sign up to set email alerts
|

Analog and Mixed-Signal IC Security via Sizing Camouflaging

Abstract: We treat the problem of analog Integrated Circuit (IC) obfuscation towards Intellectual Property (IP) protection against reverse engineering. Obfuscation is achieved by camouflaging the effective geometry of layout components via the use of fake contacts, which originally were proposed for gate camouflaging in digital ICs. We present a library of obfuscated layout components, we give recommendations for effective camouflaging, we discuss foreseen attacks and the achieved resiliency, and we propose security met… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
15
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
2
2

Relationship

4
4

Authors

Journals

citations
Cited by 20 publications
(15 citation statements)
references
References 43 publications
0
15
0
Order By: Relevance
“…The orange curves in Figs. [16][17][18][19] show the HT-infected performances in this scenario. As it can be seen, all performances are degraded.…”
Section: B Ht Payload Designmentioning
confidence: 67%
See 2 more Smart Citations
“…The orange curves in Figs. [16][17][18][19] show the HT-infected performances in this scenario. As it can be seen, all performances are degraded.…”
Section: B Ht Payload Designmentioning
confidence: 67%
“…The red curves in Figs. [16][17][18][19] show the HT-infected performances in this scenario. As it can be seen, there is no noise shaping and the signal now is buried under the noise floor.…”
Section: B Ht Payload Designmentioning
confidence: 67%
See 1 more Smart Citation
“…Besides locking methods, other anti-piracy methods include split manufacturing [21] and camouflaging [22], [23]. While locking is an end-to-end protection method against all potential threats, i.e., untrusted SoC integrator, foundry, and end-user, split manufacturing protects only against an untrusted foundry and camouflaging protects only against an untrusted end-user that attempts to clone the circuit via reverse-engineering.…”
Section: Physical Obfuscationmentioning
confidence: 99%
“…All phases of supply chain rouge can perform different malicious activities such as IP infringement, IC counterfeiting, overbuilding, hardware Trojans, side-channel attacks. It can cause serious security and economic concerns in the semiconductor industry, resulting in billions of dollars lost each year [8][9][10]. A major enabler of these malicious and unlawful activities is reverse engineering (RE), where the rogues usually exploit the advantages of commercially available RE tools that were developed for honest purposes as fault analysis, chip testing and verification.…”
Section: Introductionmentioning
confidence: 99%