Reverse Engineering Camouflaged Sequential Integrated Circuits Without Scan Access

10/28/2017
by   Mohamed El Massad, et al.
0

Integrated circuit (IC) camouflaging is a promising technique to protect the design of a chip from reverse engineering. However, recent work has shown that even camouflaged ICs can be reverse engineered from the observed input/output behaviour of a chip using SAT solvers. However, these so-called SAT attacks have so far targeted only camouflaged combinational circuits. For camouflaged sequential circuits, the SAT attack requires that the internal state of the circuit is controllable and observable via the scan chain. It has been implicitly assumed that restricting scan chain access increases the security of camouflaged ICs from reverse engineering attacks. In this paper, we develop a new attack methodology to decamouflage sequential circuits without scan access. Our attack uses a model checker (a more powerful reasoning tool than a SAT solver) to find a discriminating set of input sequences, i.e., one that is sufficient to determine the functionality of camouflaged gates. We propose several refinements, including the use of a bounded model checker, and sufficient conditions for determining when a set of input sequences is discriminating to improve the run-time and scalabilty of our attack. Our attack is able to decamouflage a large sequential benchmark circuit that implements a subset of the VIPER processor.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
04/28/2023

Unraveling Latch Locking Using Machine Learning, Boolean Analysis, and ILP

Logic locking has become a promising approach to provide hardware securi...
research
02/14/2019

Estimating the Circuit Deobfuscating Runtime based on Graph Deep Learning

Circuit obfuscation is a recently proposed defense mechanism to protect ...
research
03/02/2020

TimingCamouflage+: Netlist Security Enhancement with Unconventional Timing (with Appendix)

With recent advances in reverse engineering, attackers can reconstruct a...
research
05/24/2020

SCRAMBLE: The State, Connectivity and Routing Augmentation Model for Building Logic Encryption

In this paper, we introduce SCRAMBLE, as a novel logic locking solution ...
research
07/11/2023

ObNoCs: Protecting Network-on-Chip Fabrics Against Reverse-Engineering Attacks

Modern System-on-Chip designs typically use Network-on-Chip (NoC) fabric...
research
08/19/2022

A Pragmatic Methodology for Blind Hardware Trojan Insertion in Finalized Layouts

A potential vulnerability for integrated circuits (ICs) is the insertion...

Please sign up or login with your details

Forgot password? Click here to reset