ABSTRACT
In today's world, sending a chip design to a third party foundry for fabrication poses a serious threat to one's intellectual property. To keep designs safe from adversaries, design obfuscation techniques have been developed to protect the IP details of the design. This paper explains how the previously considered secure algorithm, TimingCamouflage+, can be thwarted and the original circuit can be recovered [15]. By removing wave-pipelining false paths, the TimingCamouflage+ algorithm is reduced to the insecure TimingCamouflage algorithm [16]. Since the TimingCamouflage algorithm is vulnerable to the TimingSAT attack, this reduction proves that TimingCamouflage+ is also vulnerable to TimingSAT and not a secure camouflaging technique [7]. This paper describes how wave-pipelining paths can be removed, and this method of handling false paths is tested on various benchmarks and shown to be both functionally correct and feasible in complexity.
- Alex Baumgarten, Akhilesh Tyagi, and Joseph Zambreno. 2010. Preventing IC piracy using reconfigurable logic barriers. IEEE design & Test of computers, Vol. 27, 1 (2010), 66--75.Google ScholarDigital Library
- Ronald P Cocchi, James P Baukus, Lap Wai Chow, and Bryan J Wang. 2014. Circuit camouflage integration for hardware IP protection. In 2014 51st ACM/EDAC/IEEE Design Automation Conference (DAC). IEEE, 1--5.Google ScholarDigital Library
- Maria I Mera Collantes, Mohamed El Massad, and Siddharth Garg. 2016. Threshold-dependent camouflaged cells to secure circuits against reverse engineering attacks. In 2016 IEEE Computer Society Annual Symposium on VLSI (ISVLSI). IEEE, 443--448.Google ScholarCross Ref
- Giovanni Di Crescenzo, Jeyavijayan Rajendran, Ramesh Karri, and Nasir Memon. 2017. Boolean circuit camouflage: Cryptographic models, limitations, provable results and a random oracle realization. In Proceedings of the 2017 Workshop on Attacks and Solutions in Hardware Security. 7--16.Google ScholarDigital Library
- Mohamed El Massad, Siddharth Garg, and Mahesh V Tripunitara. 2019. The SAT attack on IC camouflaging: Impact and potential countermeasures. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, Vol. 39, 8 (2019), 1577--1590.Google ScholarDigital Library
- Farinaz Koushanfar. 2011. Provably secure active IC metering techniques for piracy avoidance and digital rights management. IEEE Transactions on Information Forensics and Security, Vol. 7, 1 (2011), 51--63.Google ScholarDigital Library
- Meng Li, Kaveh Shamsi, Yier Jin, and David Z Pan. 2018. TimingSAT: Decamouflaging timing-based logic obfuscation. In 2018 IEEE International Test Conference (ITC). IEEE, 1--10.Google ScholarCross Ref
- Meng Li, Kaveh Shamsi, Travis Meade, Zheng Zhao, Bei Yu, Yier Jin, and David Z Pan. 2017. Provably secure camouflaging strategy for IC protection. IEEE transactions on computer-aided design of integrated circuits and systems, Vol. 38, 8 (2017), 1399--1412.Google Scholar
- Yuntao Liu, Michael Zuzak, Yang Xie, Abhishek Chakraborty, and Ankur Srivastava. 2020. Strong anti-SAT: Secure and effective logic locking. In 2020 21st International Symposium on Quality Electronic Design (ISQED). IEEE, 199--205.Google ScholarCross Ref
- Jarrod A Roy, Farinaz Koushanfar, and Igor L Markov. 2010. Ending piracy of integrated circuits. Computer, Vol. 43, 10 (2010), 30--38.Google ScholarDigital Library
- Pramod Subramanyan, Sayak Ray, and Sharad Malik. 2015. Evaluating the security of logic encryption algorithms. In 2015 IEEE International Symposium on Hardware Oriented Security and Trust (HOST). IEEE, 137--143.Google ScholarCross Ref
- Yang Xie and Ankur Srivastava. 2018. Anti-sat: Mitigating sat attack on logic locking. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, Vol. 38, 2 (2018), 199--207.Google ScholarDigital Library
- Muhammad Yasin, Bodhisatwa Mazumdar, Ozgur Sinanoglu, and Jeyavijayan Rajendran. 2016. CamoPerturb: Secure IC camouflaging for minterm protection. In 2016 IEEE/ACM International Conference on Computer-Aided Design (ICCAD). IEEE, 1--8.Google ScholarDigital Library
- Muhammad Yasin, Abhrajit Sengupta, Mohammed Thari Nabeel, Mohammed Ashraf, Jeyavijayan Rajendran, and Ozgur Sinanoglu. 2017. Provably-secure logic locking: From theory to practice. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. 1601--1618.Google ScholarDigital Library
- Grace Li Zhang, Bing Li, Meng Li, Bei Yu, David Z Pan, Michaela Brunner, Georg Sigl, and Ulf Schlichtmann. 2020. TimingCamouflage: Netlist security enhancement with unconventional timing. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, Vol. 39, 12 (2020), 4482--4495.Google ScholarCross Ref
- Grace Li Zhang, Bing Li, Bei Yu, David Z Pan, and Ulf Schlichtmann. 2018. TimingCamouflage: Improving circuit security against counterfeiting by unconventional timing. In 2018 Design, Automation & Test in Europe Conference & Exhibition (DATE). IEEE, 91--96.Google Scholar
Index Terms
- TimingCamouflage+ Decamouflaged
Recommendations
Operational characteristics of modern malware: PCO threats
CyberSec '18: Proceedings of the Fifth Cybersecurity SymposiumActive network threats are substantial hurdles for achieving absolute network security. This hurdle is due to the ability of highly infectious threats, like viruses and worms to propagate and duplicate autonomously and automatically, over a network. ...
Boolean Circuit Camouflage: Cryptographic Models, Limitations, Provable Results and a Random Oracle Realization
ASHES '17: Proceedings of the 2017 Workshop on Attacks and Solutions in Hardware SecurityRecent hardware advances, called gate camouflaging, have opened the possibility of protecting integrated circuits against reverse-engineering attacks. In this paper, we investigate the possibility of provably boosting the capability of physical ...
Hardware security: threat models and metrics
ICCAD '13: Proceedings of the International Conference on Computer-Aided DesignThe globalized semiconductor supply chain is vulnerable to hardware attacks including: Trojans, piracy of intellectual properties (IPs) and/or overbuilding of integrated circuits (ICs), reverse engineering, side-channels, and counterfeiting. In this ...
Comments