{"title":"Security through obscurity: Integrated circuit obfuscation using don't care conditions","authors":"S. Awan, Sidra Rashid, Mingze Gao, G. Qu","doi":"10.1109/ICCAIS.2016.7822437","DOIUrl":null,"url":null,"abstract":"Obfuscation has emerged as a promising approach to ensure supply chain security by countering the reverse engineering (RE) based attacks on integrated circuits that violate intellectual property rights of the circuit designer. However, current obfuscation methods either rely on secure memory to store the key or incur large design overhead with camouflaged gates. We propose a set of don't care based obfuscation primitives and show how they can be used to make the design IP secure with little area and delay overhead. While existing logic obfuscation techniques rely on hiding layout information from circuit attackers, our approach is different in that we introduce confusion in the sub-circuit functionality in order to increase the RE complexity while meeting the overall circuit specification. We also study how to maximize the complexity of the RE attacks and incorporate the conclusion of such a study into the proposed don't care based obfuscation method. Simulation results for ISCAS-85 benchmarks confirm that we can achieve circuit obfuscation with very high RE complexity and small design overhead, more specifically, an average 7.73% delay overhead and 5.51% area overhead.","PeriodicalId":407031,"journal":{"name":"2016 International Conference on Control, Automation and Information Sciences (ICCAIS)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 International Conference on Control, Automation and Information Sciences (ICCAIS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCAIS.2016.7822437","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 5
Abstract
Obfuscation has emerged as a promising approach to ensure supply chain security by countering the reverse engineering (RE) based attacks on integrated circuits that violate intellectual property rights of the circuit designer. However, current obfuscation methods either rely on secure memory to store the key or incur large design overhead with camouflaged gates. We propose a set of don't care based obfuscation primitives and show how they can be used to make the design IP secure with little area and delay overhead. While existing logic obfuscation techniques rely on hiding layout information from circuit attackers, our approach is different in that we introduce confusion in the sub-circuit functionality in order to increase the RE complexity while meeting the overall circuit specification. We also study how to maximize the complexity of the RE attacks and incorporate the conclusion of such a study into the proposed don't care based obfuscation method. Simulation results for ISCAS-85 benchmarks confirm that we can achieve circuit obfuscation with very high RE complexity and small design overhead, more specifically, an average 7.73% delay overhead and 5.51% area overhead.