2019
DOI: 10.1109/tcad.2018.2802870
|View full text |Cite
|
Sign up to set email alerts
|

Exploiting Spin-Orbit Torque Devices As Reconfigurable Logic for Circuit Obfuscation

Abstract: Abstract-Circuit obfuscation is a frequently used approach to conceal logic functionalities in order to prevent reverse engineering attacks on fabricated chips. Efficient obfuscation implementations are expected with lower design complexity and overhead but higher attack difficulties. In this paper, an emerging obfuscation approach is proposed by leveraging spinorbit torque (SOT) devices based look-up-tables (LUTs) as reconfigurable logic to replace the carefully selected gates. It is essentially impossible to… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
23
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
4

Relationship

1
7

Authors

Journals

citations
Cited by 28 publications
(23 citation statements)
references
References 39 publications
(67 reference statements)
0
23
0
Order By: Relevance
“…The read circuit consists of a two-branch sensing circuit with equalizing transistors [38] and a voltage sense amplifier with dynamic latched comparator [39] for digital output. Both branches of read circuit are composed by a load pMOS, a read enable nMOS and a clamped nMOS [40] [41]. The read operation is enabled by setting Read En.…”
Section: Spintronic Device Based Energy Efficient Sbgmentioning
confidence: 99%
“…The read circuit consists of a two-branch sensing circuit with equalizing transistors [38] and a voltage sense amplifier with dynamic latched comparator [39] for digital output. Both branches of read circuit are composed by a load pMOS, a read enable nMOS and a clamped nMOS [40] [41]. The read operation is enabled by setting Read En.…”
Section: Spintronic Device Based Energy Efficient Sbgmentioning
confidence: 99%
“…Considering that the authors leverage the relatively old TSMC 0.35µm library, the related overheads per SOT-LUT device could become prohibitive for large-scale camouflaging, especially in the context of modern CMOS nodes (as we consider for ours). Hence, we believe that our scheme can be superior to that of [44].…”
Section: Cost and Comparison Of The Gshe Security Primitivementioning
confidence: 88%
“…For CMOS integration, various techniques have been proposed, e.g., look-alike gates [37], threshold-voltage-dependent (TVD) camouflaging [38], [39], and camouflaging of the interconnects [40]. Emerging devices have been recently considered for camouflaging as well, e.g., in [41]- [44]; see also Sec. II-E and Sec.…”
Section: Hardware Securitymentioning
confidence: 99%
See 1 more Smart Citation
“…Technology heterogeneity recognizes the cooperating advantages of CMOS devices for their rapid switching capabilities, while simultaneously embracing emerging devices for their non-volatility, near-zero standby power, high integration density, and radiation-hardness. For instance, spintronicbased LUTs are proposed in [8], [9], [10] as the primary building blocks in reconfigurable fabrics realizing significant area and energy consumption savings. In this paper, we extend the transition toward heterogeneity along various logic paradigms by proposing a heterogeneous technology fabric realizing both probabilistic and deterministic computational models.…”
Section: Introductionmentioning
confidence: 99%