Title :
Transforming between logic locking and IC camouflaging
Author :
Muhammad Yasin;Ozgur Sinanoglu
Author_Institution :
Electrical and Computer Engineering, NYU Tandon School of Engineering
Abstract :
The globalization of IC design has resulted in security vulnerabilities and trust issues such as piracy, overbuilding, reverse engineering and Hardware Trojans. Logic locking and IC camouflaging are two techniques that help thwart piracy and reverse engineering attacks by making modifications at the netlist level and the layout level, respectively. In this paper, we analyze the similarities and differences among logic locking and IC camouflaging. We p resent methods to transformation camouflaged netlist to its security-equivalent logic locked netlist and vice versa. The proposed transformations enable the switch from one defense technique to the other, and assess and compare the effectiveness of the two techniques using the same set of analysis algorithms and tools.
Keywords :
"Integrated circuits","Logic gates","Foundries","Reverse engineering","Layout","IP networks","Hardware"
Conference_Titel :
Design & Test Symposium (IDT), 2015 10th International
DOI :
10.1109/IDT.2015.7396725