2022
DOI: 10.1145/3510421
|View full text |Cite
|
Sign up to set email alerts
|

Breaking the Design and Security Trade-off of Look-up-table–based Obfuscation

Abstract: Logic locking and Integrated Circuit (IC) camouflaging are the most prevalent protection schemes that can thwart most hardware security threats. However, the state-of-the-art attacks, including Boolean Satisfiability (SAT) and approximation-based attacks, question the efficacy of the existing defense schemes. Recent obfuscation schemes have employed reconfigurable logic to secure designs against various hardware security threats. However, they have focused on specific design elements such as SAT hardness. Desp… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 48 publications
(79 reference statements)
0
2
0
Order By: Relevance
“…Countermeasures to secure an IC also apply to a malicious end-user that can be interested in reverse engineering a design. Noteworthy examples of countermeasures are Logic Locking [6]- [10], IC Camouflaging [11]- [13], Split Manufacturing [14], [15], and FPGA-like obfuscation approaches [16]- [24]. The latter style of obfuscation attempts to exploit an FPGA (or FPGA-like) fabric, where the functionality of the circuit is hidden by the configuration and the bitstream serves as a key to unlock the design.…”
Section: Introductionmentioning
confidence: 99%
“…Countermeasures to secure an IC also apply to a malicious end-user that can be interested in reverse engineering a design. Noteworthy examples of countermeasures are Logic Locking [6]- [10], IC Camouflaging [11]- [13], Split Manufacturing [14], [15], and FPGA-like obfuscation approaches [16]- [24]. The latter style of obfuscation attempts to exploit an FPGA (or FPGA-like) fabric, where the functionality of the circuit is hidden by the configuration and the bitstream serves as a key to unlock the design.…”
Section: Introductionmentioning
confidence: 99%
“…The hardware security discipline in recent years experienced a plethora of threats like the Malware attacks [1][2][3][4][5][6][7], Side-Channel Attacks [8][9][10][11], Hardware Trojan attacks [12], reverse engineering threats [13][14][15][16][17][18][19][20][21][22][23][24][25][26] and so on. I focus on the malware detection technique here along with some state-of-the-art works.…”
Section: Introduction To Malware Threatsmentioning
confidence: 99%