Visible to the public Provably Secure Camouflaging Strategy for IC Protection

TitleProvably Secure Camouflaging Strategy for IC Protection
Publication TypeConference Paper
Year of Publication2016
AuthorsLi, Meng, Shamsi, Kaveh, Meade, Travis, Zhao, Zheng, Yu, Bei, Jin, Yier, Pan, David Z.
Conference NameProceedings of the 35th International Conference on Computer-Aided Design
Date PublishedNovember 2016
PublisherACM
Conference LocationNew York, NY, USA
ISBN Number978-1-4503-4466-1
Keywordscompositionality, Metrics, provable security, pubcrawl, Resiliency
Abstract

The advancing of reverse engineering techniques has complicated the efforts in intellectual property protection. Proactive methods have been developed recently, among which layout-level IC camouflaging is the leading example. However, existing camouflaging methods are rarely supported by provably secure criteria, which further leads to over-estimation of the security level when countering the latest de-camouflaging attacks, e.g., the SAT-based attack. In this paper, a quantitative security criterion is proposed for de-camouflaging complexity measurements and formally analyzed through the demonstration of the equivalence between the existing de-camouflaging strategy and the active learning scheme. Supported by the new security criterion, two novel camouflaging techniques are proposed, the low-overhead camouflaging cell library and the AND-tree structure, to help achieve exponentially increasing security levels at the cost of linearly increasing performance overhead on the circuit under protection. A provably secure camouflaging framework is then developed by combining these two techniques. Experimental results using the security criterion show that the camouflaged circuits with the proposed framework are of high resilience against the SAT-based attack with negligible performance overhead.

URLhttps://dl.acm.org/doi/10.1145/2966986.2967065
DOI10.1145/2966986.2967065
Citation Keyli_provably_2016