Threshold-Dependent Camouflaged Cells to Secure Circuits Against Reverse Engineering Attacks

@article{Collantes2016ThresholdDependentCC,
  title={Threshold-Dependent Camouflaged Cells to Secure Circuits Against Reverse Engineering Attacks},
  author={Maria I. Mera Collantes and Mohamed El Massad and Siddharth Garg},
  journal={2016 IEEE Computer Society Annual Symposium on VLSI (ISVLSI)},
  year={2016},
  pages={443-448}
}
With current tools and technology, someone who has physical access to a chip can extract the detailed layout of the integrated circuit (IC). By using advanced visual imaging techniques, reverse engineering can reveal details that are meant to be kept secret, such as a secure protocol or novel implementation that offers a competitive advantage. A promising solution to defend against reverse engineering attacks is IC camouflaging. In this work, we propose a new camouflaging technique based on the… CONTINUE READING

Citations

Publications citing this paper.
SHOWING 1-10 OF 22 CITATIONS

Obfuscating the interconnects: Low-cost and resilient full-chip layout camouflaging

  • 2017 IEEE/ACM International Conference on Computer-Aided Design (ICCAD)
  • 2017
VIEW 4 EXCERPTS
CITES BACKGROUND & RESULTS
HIGHLY INFLUENCED

Provably Secure Camouflaging Strategy for IC Protection

  • IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems
  • 2019
VIEW 1 EXCERPT
CITES BACKGROUND

A compact energy-efficient pseudo-static camouflaged logic family

  • 2018 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)
  • 2018

Algorithmic Obfuscation over GF(2m)

VIEW 1 EXCERPT
CITES BACKGROUND

References

Publications referenced by this paper.
SHOWING 1-10 OF 22 REFERENCES

Security analysis of integrated circuit camouflaging

  • ACM Conference on Computer and Communications Security
  • 2013
VIEW 5 EXCERPTS
HIGHLY INFLUENTIAL

New Generation of Predictive Technology Model for Sub-45 nm Early Design Exploration

  • IEEE Transactions on Electron Devices
  • 2006
VIEW 3 EXCERPTS
HIGHLY INFLUENTIAL

Reversing stealthy dopant-level circuits

  • Journal of Cryptographic Engineering
  • 2014
VIEW 1 EXCERPT

A 65 nm 2-Billion Transistor Quad-Core Itanium Processor

  • IEEE Journal of Solid-State Circuits
  • 2009
VIEW 1 EXCERPT