Proceedings of the 35th International Conference on Computer-Aided Design 2016
DOI: 10.1145/2966986.2967065
|View full text |Cite
|
Sign up to set email alerts
|

Provably secure camouflaging strategy for IC protection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
65
0

Year Published

2019
2019
2020
2020

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 92 publications
(65 citation statements)
references
References 14 publications
0
65
0
Order By: Relevance
“…The resulting camouflaging limit (right) is the ratio of cells that can be camouflaged over total cell instances, the latter as obtained by regular synthesis using the full library (left). Cells described as relevant for XOR-type camouflaging in [17]: BUF, INV, AND2, NAND2, OR2, NOR2, AND3, NAND3; cells described as relevant for STF-type camouflaging in [17]: BUF, INV, AND2, NAND2, OR2, AND3; cells assumed relevant for XOR-NAND-NOR camouflaging [7]: XOR2, NAND2, NOR2; cells assumed relevant for threshold-dependent camouflaging [11]: AND2, NAND2, NOR2, OR2, XOR2, XNOR2. remain largely as is, and additional steps are only required for preparation, shipping, and finalization of FEOL wafers.…”
Section: A Split Manufacturingmentioning
confidence: 99%
See 4 more Smart Citations
“…The resulting camouflaging limit (right) is the ratio of cells that can be camouflaged over total cell instances, the latter as obtained by regular synthesis using the full library (left). Cells described as relevant for XOR-type camouflaging in [17]: BUF, INV, AND2, NAND2, OR2, NOR2, AND3, NAND3; cells described as relevant for STF-type camouflaging in [17]: BUF, INV, AND2, NAND2, OR2, AND3; cells assumed relevant for XOR-NAND-NOR camouflaging [7]: XOR2, NAND2, NOR2; cells assumed relevant for threshold-dependent camouflaging [11]: AND2, NAND2, NOR2, OR2, XOR2, XNOR2. remain largely as is, and additional steps are only required for preparation, shipping, and finalization of FEOL wafers.…”
Section: A Split Manufacturingmentioning
confidence: 99%
“…Several studies on provably secure camouflaging (and logic locking), e.g., see [17]- [19], [44], seek to mitigate SAT-based attacks by inserting dedicated structures which necessitate considering an exponential number of I/O patterns. However, the output signals related to such structures have been identified successfully, e.g., by signal-probability-or sensitization-driven algorithms [23], [45], [46].…”
Section: Ieee Transactions On Computer-aided Design Of Integrated Cirmentioning
confidence: 99%
See 3 more Smart Citations