{"title":"浅谈最佳伪装布局的设计","authors":"T. Broadfoot, C. Sechen, J. Rajendran","doi":"10.1109/HST.2017.7951833","DOIUrl":null,"url":null,"abstract":"Integrated circuit (IC) camouflaging is a layout-level technique that hampers reverse-engineering attacks. In one embodiment of camouflaging, layouts of different Boolean gates are designed to look alike by using a combination of true and dummy contacts. The security of IC camouflaging using dummy contacts depends on an attackers inability to determine whether a contact is true or dummy. The layouts of camouflaged gates in prior works incur tremendous overhead: 4x in area, 5.5x in power, and 1.8x in delay. Thus, overhead is a major impediment to adoption of IC camouflaging. To solve this problem, we propose an algorithm to generate the layouts of camouflaged gates using dummy contacts for static CMOS logic. In this work, we develop low-cost camouflaging solutions using a graph-theoretic approach. Given an optimization objective and a list of Boolean functions whose layouts have to look alike, the proposed algorithm produces look-alike layouts that are optimized (minimized) in terms of area, power, delay, or a combination. Results indicate that the proposed design is more robust against variations and has better noise margin than the existing techniques.","PeriodicalId":190635,"journal":{"name":"2017 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)","volume":"49 9","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"On designing optimal camouflaged layouts\",\"authors\":\"T. Broadfoot, C. Sechen, J. Rajendran\",\"doi\":\"10.1109/HST.2017.7951833\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Integrated circuit (IC) camouflaging is a layout-level technique that hampers reverse-engineering attacks. In one embodiment of camouflaging, layouts of different Boolean gates are designed to look alike by using a combination of true and dummy contacts. The security of IC camouflaging using dummy contacts depends on an attackers inability to determine whether a contact is true or dummy. The layouts of camouflaged gates in prior works incur tremendous overhead: 4x in area, 5.5x in power, and 1.8x in delay. Thus, overhead is a major impediment to adoption of IC camouflaging. To solve this problem, we propose an algorithm to generate the layouts of camouflaged gates using dummy contacts for static CMOS logic. In this work, we develop low-cost camouflaging solutions using a graph-theoretic approach. Given an optimization objective and a list of Boolean functions whose layouts have to look alike, the proposed algorithm produces look-alike layouts that are optimized (minimized) in terms of area, power, delay, or a combination. Results indicate that the proposed design is more robust against variations and has better noise margin than the existing techniques.\",\"PeriodicalId\":190635,\"journal\":{\"name\":\"2017 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)\",\"volume\":\"49 9\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-05-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/HST.2017.7951833\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/HST.2017.7951833","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Integrated circuit (IC) camouflaging is a layout-level technique that hampers reverse-engineering attacks. In one embodiment of camouflaging, layouts of different Boolean gates are designed to look alike by using a combination of true and dummy contacts. The security of IC camouflaging using dummy contacts depends on an attackers inability to determine whether a contact is true or dummy. The layouts of camouflaged gates in prior works incur tremendous overhead: 4x in area, 5.5x in power, and 1.8x in delay. Thus, overhead is a major impediment to adoption of IC camouflaging. To solve this problem, we propose an algorithm to generate the layouts of camouflaged gates using dummy contacts for static CMOS logic. In this work, we develop low-cost camouflaging solutions using a graph-theoretic approach. Given an optimization objective and a list of Boolean functions whose layouts have to look alike, the proposed algorithm produces look-alike layouts that are optimized (minimized) in terms of area, power, delay, or a combination. Results indicate that the proposed design is more robust against variations and has better noise margin than the existing techniques.