Hardware hardening approaches using camouflaging, encryption, and obfuscation
Due to the trend of globalized semiconductor supply chain, integrated circuits (IC) and
hardware intellectual property (IP) are prone to serious security threats such as reverse
engineering and IP piracy. In addition to the post-fabrication authentication techniques (eg,
IP metering), various hardware hardening approaches have emerged to resist reverse
engineering and IP piracy. This chapter reviews three representable security hardening
approaches—camouflaging, logic encryption/locking, and design obfuscation—that are …
hardware intellectual property (IP) are prone to serious security threats such as reverse
engineering and IP piracy. In addition to the post-fabrication authentication techniques (eg,
IP metering), various hardware hardening approaches have emerged to resist reverse
engineering and IP piracy. This chapter reviews three representable security hardening
approaches—camouflaging, logic encryption/locking, and design obfuscation—that are …
Abstract
Due to the trend of globalized semiconductor supply chain, integrated circuits (IC) and hardware intellectual property (IP) are prone to serious security threats such as reverse engineering and IP piracy. In addition to the post-fabrication authentication techniques (e.g., IP metering), various hardware hardening approaches have emerged to resist reverse engineering and IP piracy. This chapter reviews three representable security hardening approaches—camouflaging, logic encryption/locking, and design obfuscation—that are applied to ICs at layout, gate, and register transfer levels. Particularly, this chapter presents a dynamic state-deflection-based obfuscation method, which deflects the state transition from the original transition path to a black hole cluster if an invalid key is applied to the hardware IP. This obfuscation method can successfully thwart the reverse engineering attack that exploits the code analysis support from electronic design automation (EDA) tools. Furthermore, this chapter extends the idea of design obfuscation for two-dimensional IC to emerging three-dimensional (3D) IC design technology. The proposed method is based on the insertion of a Network-on-Chip (NoC)-based shielding plane between two commercial dies to build the secure 3D ICs without involvement of trustworthy foundries.
Springer
以上显示的是最相近的搜索结果。 查看全部搜索结果