2016 17th International Symposium on Quality Electronic Design (ISQED) 2016
DOI: 10.1109/isqed.2016.7479225
|View full text |Cite
|
Sign up to set email alerts
|

Digital IP protection using threshold voltage control

Abstract: Abstract-This paper proposes a method to completely hide the functionality of a digital standard cell. This is accomplished by a differential threshold logic gate (TLG). A TLG with n inputs implements a subset of Boolean functions of n variables that are linear threshold functions. The output of such a gate is one if and only if an integer weighted linear arithmetic sum of the inputs equals or exceeds a given integer threshold. We present a novel architecture of a TLG that not only allows a single TLG to imple… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2017
2017
2018
2018

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 17 publications
0
3
0
Order By: Relevance
“…Recent hardware advances have opened the possibility for protection of integrated circuits against reverse-engineering attacks via gate camouflaging [12,14,21,24,25,28]. While many of these works consider general Boolean functions in specific attack model, here we consider specific set of Boolean functions in general attack models.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…Recent hardware advances have opened the possibility for protection of integrated circuits against reverse-engineering attacks via gate camouflaging [12,14,21,24,25,28]. While many of these works consider general Boolean functions in specific attack model, here we consider specific set of Boolean functions in general attack models.…”
Section: Discussionmentioning
confidence: 99%
“…While the layouts of two distinct physical gates look obviously different (and are hence easy to reverse engineer), the layouts of the same gates, after using dummy contacts, look identical and difficult to differentiate [4,5,7,28]. We refer to papers [12,14,16,24,25,28] for more on the class of dummy contacts and other camouflaging techniques. Adversary model.…”
Section: The Circuit Camouflaging Problemmentioning
confidence: 99%
“…Logic obfuscation is the process of hiding the functionality of an IP by building ambiguity or by implementing post manufacturing means of control and programmability into its netlist. Gate camouflaging and circuit locking are two of the widely explored obfuscation mechanisms [3][4] [5]. A camouflaged gate is a gate that after RE (by means of delayering and lithography) could be mapped to any of possible set of gates or may look like one logic gate, however functionally perform as a different gate.…”
Section: Introductionmentioning
confidence: 99%