Scalable Attack-Resistant Obfuscation of Logic Circuits

10/29/2020
by   Abdulrahman Alaql, et al.
0

Hardware IP protection has been one of the most critical areas of research in the past years. Recently, attacks on hardware IPs (such as reverse engineering or cloning) have evolved as attackers have developed sophisticated techniques. Therefore, hardware obfuscation has been introduced as a powerful tool to protect IPs against piracy attacks. However, many recent attempts to break existing obfuscation methods have been successful in unlocking the IP and restoring its functionality. In this paper, we propose SARO, a Scalable Attack-Resistant Obfuscation that provides a robust functional and structural design transformation process. SARO treats the target circuit as a graph, and performs a partitioning algorithm to produce a set of sub-graphs, then applies our novel Truth Table Transformation (T3) process to each partition. We also propose the T3_metric, which is developed to quantify the structural and functional design transformation level caused by the obfuscation process. We evaluate SARO on ISCAS85 and EPFL benchmarks, and provide full security and performance analysis of our proposed framework.

READ FULL TEXT
research
09/27/2018

SAIL: Machine Learning Guided Structural Analysis Attack on Hardware Obfuscation

Obfuscation is a technique for protecting hardware intellectual property...
research
09/05/2022

Hide Seek: Seeking the (Un)-Hidden key in Provably-Secure Logic Locking Techniques

Logic locking protects an IC from threats such as piracy of design IP an...
research
07/21/2022

High-Level Approaches to Hardware Security: A Tutorial

Designers use third-party intellectual property (IP) cores and outsource...
research
08/18/2022

Reverse Engineering of Integrated Circuits: Tools and Techniques

Consumer and defense systems demanded design and manufacturing of electr...
research
04/01/2022

Preventing Distillation-based Attacks on Neural Network IP

Neural networks (NNs) are already deployed in hardware today, becoming v...
research
12/09/2021

How Not to Protect Your IP – An Industry-Wide Break of IEEE 1735 Implementations

Modern hardware systems are composed of a variety of third-party Intelle...
research
04/18/2022

Automatic Hardware Trojan Insertion using Machine Learning

Due to the current horizontal business model that promotes increasing re...

Please sign up or login with your details

Forgot password? Click here to reset