作者
Jeyavijayan Rajendran, Youngok Pino, Ozgur Sinanoglu, Ramesh Karri
发表日期
2012/6/3
图书
Proceedings of the 49th annual design automation conference
页码范围
83-89
简介
Due to globalization of Integrated Circuit (IC) design flow, rogue elements in the supply chain can pirate ICs, overbuild ICs, and insert hardware trojans. EPIC [1] obfuscates the design by randomly inserting additional gates; only a correct key makes the design to produce correct outputs. We demonstrate that an attacker can decipher the obfuscated netlist, in a time linear to the number of keys, by sensitizing the key values to the output. We then develop techniques to fix this vulnerability and make obfuscation truly exponential in the number of inserted keys.
引用总数
201320142015201620172018201920202021202220232024131523386057778767696123
学术搜索中的文章
J Rajendran, Y Pino, O Sinanoglu, R Karri - Proceedings of the 49th annual design automation …, 2012