Provably Secure Camouflaging Strategy For Ic Protection
Abstract
The advancing of reverse engineering techniques has complicated the efforts in intellectual property protection. Proactive methods have been developed recently, among which layout-level IC camouflaging is the leading example. However, existing camouflaging methods are rarely supported by provably secure criteria, which further leads to over-estimation of the security level when countering the latest de-camouflaging attacks, e.g., the SAT-based attack. In this paper, a quantitative security criterion is proposed for de-camouflaging complexity measurements and formally analyzed through the demonstration of the equivalence between the existing de-camouflaging strategy and the active learning scheme. Supported by the new security criterion, two novel camouflaging techniques are proposed, the low-overhead camouflaging cell library and the AND-tree structure, to help achieve exponentially increasing security levels at the cost of linearly increasing performance overhead on the circuit under protection. A provably secure camouflaging framework is then developed by combining these two techniques. Experimental results using the security criterion show that the camouflaged circuits with the proposed framework are of high resilience against the SAT-based attack with negligible performance overhead.
Publication Date
11-7-2016
Publication Title
IEEE/ACM International Conference on Computer-Aided Design, Digest of Technical Papers, ICCAD
Volume
07-10-November-2016
Document Type
Article; Proceedings Paper
Personal Identifier
scopus
DOI Link
https://doi.org/10.1145/2966986.2967065
Copyright Status
Unknown
Socpus ID
85001055571 (Scopus)
Source API URL
https://api.elsevier.com/content/abstract/scopus_id/85001055571
STARS Citation
Li, Meng; Shamsi, Kaveh; Meade, Travis; Zhao, Zheng; and Yu, Bei, "Provably Secure Camouflaging Strategy For Ic Protection" (2016). Scopus Export 2015-2019. 3973.
https://stars.library.ucf.edu/scopus2015/3973