Cyclic Obfuscation For Creating Sat-Unresolvable Circuits
Abstract
Logic locking and IC camouflaging are proactive circuit obfuscation methods that if proven secure can thwart hardware attacks such as reverse engineering and IP theft. However, the security of both these schemes is called into question by recent SAT based attacks. While a number of methods have been proposed in literature that exponentially increase the running time of such attacks, they are vulnerable to "find-and-remove" attacks, and only slightly hide the circuit functionality. In this paper, we present a novel approach towards creating SAT attack resiliency based on creating densely cyclic obfuscated circuit topologies by adding dummy paths to the circuit. Our methodology is applicable to both IC camouflaging and logic locking. We demonstrate that cyclic logic locking creates SAT resilient circuits with 40% less area and 20% less delay compared to an insecure XOR/XNOR-obfuscation with the same key length. Furthermore, we show that cyclic IC camouflaging can be implemented at the layout level with no substrate area overhead and little delay and power overhead with respect to the original circuit.
Publication Date
5-10-2017
Publication Title
Proceedings of the ACM Great Lakes Symposium on VLSI, GLSVLSI
Volume
Part F127756
Number of Pages
173-178
Document Type
Article; Proceedings Paper
Personal Identifier
scopus
DOI Link
https://doi.org/10.1145/3060403.3060458
Copyright Status
Unknown
Socpus ID
85021224112 (Scopus)
Source API URL
https://api.elsevier.com/content/abstract/scopus_id/85021224112
STARS Citation
Shamsi, Kaveh; Li, Meng; Meade, Travis; Zhao, Zheng; and Pan, David Z., "Cyclic Obfuscation For Creating Sat-Unresolvable Circuits" (2017). Scopus Export 2015-2019. 7018.
https://stars.library.ucf.edu/scopus2015/7018