Provably Secure Camouflaging Strategy for IC Protection
Title | Provably Secure Camouflaging Strategy for IC Protection |
Publication Type | Conference Paper |
Year of Publication | 2016 |
Authors | Li, Meng, Shamsi, Kaveh, Meade, Travis, Zhao, Zheng, Yu, Bei, Jin, Yier, Pan, David Z. |
Conference Name | Proceedings of the 35th International Conference on Computer-Aided Design |
Date Published | November 2016 |
Publisher | ACM |
Conference Location | New York, NY, USA |
ISBN Number | 978-1-4503-4466-1 |
Keywords | compositionality, Metrics, provable security, pubcrawl, Resiliency |
Abstract | The advancing of reverse engineering techniques has complicated the efforts in intellectual property protection. Proactive methods have been developed recently, among which layout-level IC camouflaging is the leading example. However, existing camouflaging methods are rarely supported by provably secure criteria, which further leads to over-estimation of the security level when countering the latest de-camouflaging attacks, e.g., the SAT-based attack. In this paper, a quantitative security criterion is proposed for de-camouflaging complexity measurements and formally analyzed through the demonstration of the equivalence between the existing de-camouflaging strategy and the active learning scheme. Supported by the new security criterion, two novel camouflaging techniques are proposed, the low-overhead camouflaging cell library and the AND-tree structure, to help achieve exponentially increasing security levels at the cost of linearly increasing performance overhead on the circuit under protection. A provably secure camouflaging framework is then developed by combining these two techniques. Experimental results using the security criterion show that the camouflaged circuits with the proposed framework are of high resilience against the SAT-based attack with negligible performance overhead. |
URL | https://dl.acm.org/doi/10.1145/2966986.2967065 |
DOI | 10.1145/2966986.2967065 |
Citation Key | li_provably_2016 |