Abstract | ||
---|---|---|
With recent advances in reverse engineering, attackers can reconstruct a netlist to counterfeit chips by opening the die and scanning all layers of authentic chips. This relatively easy counterfeiting is made possible by the use of the standard simple clocking scheme, where all combinational blocks function within one clock period, so that a netlist of combinational logic gates and flip-flops is sufficient to duplicate a design. In this article, we propose to invalidate the assumption that a netlist completely represents the function of a circuit with unconventional timing. With the introduced wave-pipelining (WP) paths, attackers have to capture gate and interconnect delays during reverse engineering, or to test a huge number of combinational paths to identify the WP paths. To hinder the test-based attack, we construct false paths with WP to increase the counterfeiting challenge. The experimental results confirm that WP true paths and false paths can be constructed in benchmark circuits successfully with only a negligible cost, thus thwarting the potential attack techniques. |
Year | DOI | Venue |
---|---|---|
2020 | 10.1109/TCAD.2020.2974338 | IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems |
Keywords | DocType | Volume |
Anti-counterfeiting,embedded security,IC camouflage,netlist camouflage,netlist security,reverse engineering,wave pipelining | Journal | 39 |
Issue | ISSN | Citations |
12 | 0278-0070 | 0 |
PageRank | References | Authors |
0.34 | 0 | 8 |
Name | Order | Citations | PageRank |
---|---|---|---|
Grace Li Zhang | 1 | 13 | 3.68 |
Bing Li | 2 | 172 | 33.77 |
Meng Li | 3 | 132 | 17.74 |
Bei Yu | 4 | 656 | 74.07 |
David Pan | 5 | 10 | 3.60 |
Brunner Michaela | 6 | 0 | 0.34 |
Georg Sigl | 7 | 447 | 62.13 |
Ulf Schlichtmann | 8 | 109 | 21.56 |