阈值电压定义多输入复合门

Asmit De, Swaroop Ghosh
{"title":"阈值电压定义多输入复合门","authors":"Asmit De, Swaroop Ghosh","doi":"10.1109/HST.2017.7951828","DOIUrl":null,"url":null,"abstract":"Semiconductor devices are increasingly getting more vulnerable to counterfeiting due to Reverse Engineering (RE) of Intellectual Property (IP). Securing the IPs from counterfeiting is an important goal towards trustworthy computing. Camouflaging of logic gates is a well-known technique to prevent an adversary from de-layering the chip and stealing IP. Among other techniques, threshold voltage modulation has been proposed to realize 2-input camouflaging logic in both static and dynamic logic gate families. Since threshold voltages are asserted during fabrication and are difficult to identify during reverse engineering, the adversary will be forced to launch brute-force search. In this work, we extend the concept of threshold-voltage defined logic to design 3-input static camouflaged gates capable of performing six Boolean functions (NAND, NOR, AOI, OAI, XOR, XNOR). Simulation results show an average of 3.03X delay overhead and 12.33X power overhead compared to standard CMOS gates. The area benefit with respect to cumulative sum of 6 discreet normal CMOS gates is approximately 65%. A methodology to design multi-input camouflaged gate is also proposed using a similar technique. We also identify temperature sensitivity and power signature as potential side channels. Finally, a threat analysis is performed on the camouflaged gate design to assess the security and integrity of the design.","PeriodicalId":190635,"journal":{"name":"2017 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Threshold voltage defined multi-input complex gates\",\"authors\":\"Asmit De, Swaroop Ghosh\",\"doi\":\"10.1109/HST.2017.7951828\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Semiconductor devices are increasingly getting more vulnerable to counterfeiting due to Reverse Engineering (RE) of Intellectual Property (IP). Securing the IPs from counterfeiting is an important goal towards trustworthy computing. Camouflaging of logic gates is a well-known technique to prevent an adversary from de-layering the chip and stealing IP. Among other techniques, threshold voltage modulation has been proposed to realize 2-input camouflaging logic in both static and dynamic logic gate families. Since threshold voltages are asserted during fabrication and are difficult to identify during reverse engineering, the adversary will be forced to launch brute-force search. In this work, we extend the concept of threshold-voltage defined logic to design 3-input static camouflaged gates capable of performing six Boolean functions (NAND, NOR, AOI, OAI, XOR, XNOR). Simulation results show an average of 3.03X delay overhead and 12.33X power overhead compared to standard CMOS gates. The area benefit with respect to cumulative sum of 6 discreet normal CMOS gates is approximately 65%. A methodology to design multi-input camouflaged gate is also proposed using a similar technique. We also identify temperature sensitivity and power signature as potential side channels. Finally, a threat analysis is performed on the camouflaged gate design to assess the security and integrity of the design.\",\"PeriodicalId\":190635,\"journal\":{\"name\":\"2017 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)\",\"volume\":\"2 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-05-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/HST.2017.7951828\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/HST.2017.7951828","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

摘要

由于知识产权(IP)的逆向工程(RE),半导体器件越来越容易被假冒。保护ip不被假冒是实现可信计算的一个重要目标。逻辑门的伪装是一种众所周知的技术,以防止对手的芯片分层和窃取IP。在其他技术中,已经提出了阈值电压调制来实现静态和动态逻辑门家族的2输入伪装逻辑。由于阈值电压是在制造过程中确定的,并且在逆向工程中难以识别,因此攻击者将被迫启动暴力搜索。在这项工作中,我们扩展了阈值电压定义逻辑的概念,以设计能够执行六种布尔函数(NAND, NOR, AOI, OAI, XOR, XNOR)的三输入静态伪装门。仿真结果表明,与标准CMOS栅极相比,平均延迟开销为3.03倍,功耗开销为12.33倍。相对于6个离散的普通CMOS门的累积和,面积效益约为65%。采用类似的方法,提出了一种设计多输入伪装门的方法。我们还确定了温度灵敏度和功率特征作为潜在的侧通道。最后,对伪装门设计进行了威胁分析,以评估设计的安全性和完整性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Threshold voltage defined multi-input complex gates
Semiconductor devices are increasingly getting more vulnerable to counterfeiting due to Reverse Engineering (RE) of Intellectual Property (IP). Securing the IPs from counterfeiting is an important goal towards trustworthy computing. Camouflaging of logic gates is a well-known technique to prevent an adversary from de-layering the chip and stealing IP. Among other techniques, threshold voltage modulation has been proposed to realize 2-input camouflaging logic in both static and dynamic logic gate families. Since threshold voltages are asserted during fabrication and are difficult to identify during reverse engineering, the adversary will be forced to launch brute-force search. In this work, we extend the concept of threshold-voltage defined logic to design 3-input static camouflaged gates capable of performing six Boolean functions (NAND, NOR, AOI, OAI, XOR, XNOR). Simulation results show an average of 3.03X delay overhead and 12.33X power overhead compared to standard CMOS gates. The area benefit with respect to cumulative sum of 6 discreet normal CMOS gates is approximately 65%. A methodology to design multi-input camouflaged gate is also proposed using a similar technique. We also identify temperature sensitivity and power signature as potential side channels. Finally, a threat analysis is performed on the camouflaged gate design to assess the security and integrity of the design.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信