2020
DOI: 10.1145/3398012
|View full text |Cite
|
Sign up to set email alerts
|

Strong Logic Obfuscation with Low Overhead against IC Reverse Engineering Attacks

Abstract: Untrusted foundries pose threats of integrated circuit (IC) piracy and counterfeiting, and this has motivated research into logic locking. Strong logic locking approaches potentially prevent piracy and counterfeiting by preventing unauthorized replication and use of ICs. Unfortunately, recent work has shown that most state-of-the-art logic locking techniques are vulnerable to attacks that utilize Boolean Satisfiability (SAT) solvers. In this article, we extend our prior work on using silicon nanowire… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
3
3
1

Relationship

1
6

Authors

Journals

citations
Cited by 12 publications
(8 citation statements)
references
References 22 publications
0
8
0
Order By: Relevance
“…Among the emerging devices that offer to enhance hardware security, silicon nanowire (SiNW) FETs appear to render a promising solution with respect to circuit obfuscation . Logic gates in the original netlist are replaced with polymorphic gates (PLGs), which are designed using SiNW FETs.…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…Among the emerging devices that offer to enhance hardware security, silicon nanowire (SiNW) FETs appear to render a promising solution with respect to circuit obfuscation . Logic gates in the original netlist are replaced with polymorphic gates (PLGs), which are designed using SiNW FETs.…”
Section: Resultsmentioning
confidence: 99%
“…Among the emerging devices that offer to enhance hardware security, silicon nanowire (SiNW) FETs appear to render a promising solution with respect to circuit obfuscation. 56 Logic gates in the original netlist are replaced with polymorphic gates (PLGs), which are designed using SiNW FETs. These PLGs need to be tuned with a set of key inputs to achieve the functionality of one of the AND, OR, NAND, NOR, XOR, and XNOR logic gates.…”
Section: Resultsmentioning
confidence: 99%
“…These reconfigurable properties form the very basis, why RFETs are so widely applicable in hardware security [56,57,58,59]. We look at few of the security schemes which are possible due to this inherent reconfiguration.…”
Section: A Reconfigurable Nanotechnologiesmentioning
confidence: 99%
“…The practice of contaminating web applications with malevolent software is termed malware. In Recent Times, a massive number of malwares has been devised for attacking IoT systems [75,76] Control flow side-channel assessment [77], software integrity validation, malware detector [78], Security updates [79] (continued) Reverse Engineering All An attempt to analyze the firmware of IoT devices to reach sensitive data i.e., users' credentials [93] Self-destruction and Tamper proofing, IC/IP Obfuscation and encryption [94,95] (continued) Identity and access management, authentication, multi-factor authentication guidance, dynamic credentials [100] Brute-force attacks S4, S6 An active attack hinges on a trial-and-error strategy to obtain some data such as passwords, finance, identifiers. It employs automatic software to engender a massive amount of successive suppositions to decrypt the ciphertext [85,86] Locking out IP address, discovery tools, brute force site scanning tools [101] Data exposure attacks…”
Section: Allmentioning
confidence: 99%