DocumentCode :
3740036
Title :
Transforming between logic locking and IC camouflaging
Author :
Muhammad Yasin;Ozgur Sinanoglu
Author_Institution :
Electrical and Computer Engineering, NYU Tandon School of Engineering
fYear :
2015
Firstpage :
1
Lastpage :
4
Abstract :
The globalization of IC design has resulted in security vulnerabilities and trust issues such as piracy, overbuilding, reverse engineering and Hardware Trojans. Logic locking and IC camouflaging are two techniques that help thwart piracy and reverse engineering attacks by making modifications at the netlist level and the layout level, respectively. In this paper, we analyze the similarities and differences among logic locking and IC camouflaging. We p resent methods to transformation camouflaged netlist to its security-equivalent logic locked netlist and vice versa. The proposed transformations enable the switch from one defense technique to the other, and assess and compare the effectiveness of the two techniques using the same set of analysis algorithms and tools.
Keywords :
"Integrated circuits","Logic gates","Foundries","Reverse engineering","Layout","IP networks","Hardware"
Publisher :
ieee
Conference_Titel :
Design & Test Symposium (IDT), 2015 10th International
Type :
conf
DOI :
10.1109/IDT.2015.7396725
Filename :
7396725
Link To Document :
بازگشت