作者
Jeyavijayan Rajendran, Michael Sam, Ozgur Sinanoglu, Ramesh Karri
发表日期
2013/11/4
图书
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
页码范围
709-720
简介
Camouflaging is a layout-level technique that hampers an attacker from reverse engineering by introducing, in one embodiment, dummy contacts into the layout. By using a mix of real and dummy contacts, one can camouflage a standard cell whose functionality can be one of many. If an attacker cannot resolve the functionality of a camouflaged gate, he/she will extract an incorrect netlist. In this paper, we analyze the feasibility of identifying the functionality of camouflaged gates. We also propose techniques to make the dummy contact-based IC camouflaging technique resilient to reverse engineering. Furthermore, we judiciously select gates to camouflage by using techniques which ensure that the outputs of the extracted netlist are controllably corrupted. The techniques leverage IC testing principles such as justification and sensitization. The proposed techniques are evaluated using ISCAS benchmark circuits and …
引用总数
201420152016201720182019202020212022202320241124447560587165484216
学术搜索中的文章
J Rajendran, M Sam, O Sinanoglu, R Karri - Proceedings of the 2013 ACM SIGSAC conference on …, 2013