TimingSAT: Decamouflaging Timing-based Logic Obfuscation

2018 IEEE International Test Conference (ITC)(2018)

引用 19|浏览43
暂无评分
摘要
In order to counter advanced reverse engineering techniques, various integrated circuit (IC) camouflaging methods are proposed to protect hardware intellectual property (IP) proactively. For example, a timing-based camouflaging strategy is developed recently representing a new class of parametric camouflaging strategies. Unlike traditional IC camouflaging techniques that directly hide the circuit functionality, the new parametric strategies obfuscate the circuit timing schemes, which in turn protects the circuit functionality and invalidates all the existing attacks. In this paper, we propose a SAT attack, named TimingSAT, to analyze the security of such timing-based camouflaging strategies. We demonstrate that with a proper transformation of the camouflaged netlist, traditional SAT attacks are still effective to decamouflage the new protection methods. The correctness of the resolved circuit functionality is formally proved. While a direct implementation of TimingSAT suffers from poor scalability, we propose a simplification procedure to significantly enhance the attack efficiency without sacrificing the correctness of the decamouflaged netlist. The efficiency and effectiveness of TimingSAT is validated with extensive experimental results.
更多
查看译文
关键词
IC camouflaging techniques,TimingSAT,circuit functionality,SAT attacks,attack efficiency,camouflaged netlist,circuit timing schemes,parametric camouflaging strategies,timing-based camouflaging strategy,hardware intellectual property,integrated circuit camouflaging methods,timing-based logic obfuscation,decamouflaged netlist
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要