Design Protection Using Logic Encryption and Scan-Chain Obfuscation Techniques
نویسندگان
چکیده
Due to increase in threats posed by offshore foundries, the companies outsourcing IPs are forced protect their designs from foundries. Few of IP piracy, counterfeiting and reverse engineering. To overcome these, logic encryption has been observed be a leading countermeasure against faced. It introduces extra gates design, known as key which hide functionality design unless correct keys fed them. The scan tests used various observe fault coverage. These chains can become vulnerable side-channel attacks. potential solution for protection this vulnerability is obfuscation output chain. This involves shuffling working cells chain when incorrect test fed. In paper, we propose method well circuit. efficiency secured verified on ISCAS’89 circuits results prove security proposed posed.
منابع مشابه
Obfuscation using Encryption
Protecting source code against reverse engineering and theft is an important problem. The goal is to carry out computations using confidential algorithms on an untrusted party while ensuring confidentiality of algorithms. This problem has been addressed for Boolean circuits known as ‘circuit privacy’. Circuits corresponding to real-world programs are impractical. Well-known obfuscation techniqu...
متن کاملASIC design protection against reverse engineering during the fabrication process using automatic netlist obfuscation design flow
Fab-less business model in semiconductor industry has led to serious concerns about trustworthy hardware. In untrusted foundries and manufacturing companies, submitted layout may be analyzed and reverse engineered to steal the information of a design or insert malicious Trojans. Understanding the netlist topology is the ultimate goal of the reverse engineering process. In this paper, we propose...
متن کاملLocation Privacy Protection Through Obfuscation-Based Techniques
The widespread adoption of mobile communication devices combined with technical improvements of location technologies are fostering the development of a new wave of applications that manage physical positions of individuals to offer location-based services for business, social or informational purposes. As an effect of such innovative services, however, privacy concerns are increasing, calling ...
متن کاملCode Obfuscation Techniques for Software Protection
An important security problem is to protect software against malicious host attacks. Since the malicious hosts are responsible for the program’s execution, there seems little the program can do to protect itself from disclosure, tampering and incorrect execution [7]. This paper will review some existing code obfuscation techniques for protecting software against those attacks. We will focus our...
متن کاملasic design protection against reverse engineering during the fabrication process using automatic netlist obfuscation design flow
fab-less business model in semiconductor industry has led to serious concerns about trustworthy hardware. in untrusted foundries and manufacturing companies, submitted layout may be analyzed and reverse engineered to steal the information of a design or insert malicious trojans. understanding the netlist topology is the ultimate goal of the reverse engineering process. in this paper, we propose...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Electronics and Telecommunications
سال: 2023
ISSN: ['2300-1933', '2081-8491']
DOI: https://doi.org/10.24425/ijet.2019.129790