CAD for Assurance of Electronic Systems
 

Extract Design Secrets

Description

Globalization of the semiconductor industry has led to outsourcing of many stages of the development cycle to third-party facilities, which may not always be trusted. Hence, a rising concern regarding the security of hardware IPs has emerged as billions of dollars are lost every year to IP piracy and counterfeit components. The main objective of adversaries is to extract design information such as keys to reverse engineer the IPs and to create counterfeits. To analyze such attacks and perform security evaluation of logic locking techniques used to prevent key extraction from designs, many tools have been developed such as SAIL, SURF, SWEEP, NEOS, ObfusGEM, SMT Attack, SOMA, SCOPE, and RANE.

Related Tools

Publications

Zuzak, Michael; Srivastava, Ankur

ObfusGEM: Enhancing Processor Design Obfuscation Through Security-Aware On-Chip Memory and Data Path Design Proceedings Article

In: International Symposium on Memory Systems (MEMSYS), 2020.

BibTeX

Kuruvila, Abraham Peedikayil; Kundu, Shamik; Basu, Kanad

Defending Hardware-based Malware Detectors against Adversarial Attacks Journal Article

In: arXiv preprint arXiv:2005.03644, 2020.

Abstract | Links | BibTeX

Alaql, Abdulrahman; Forte, Domenic; Bhunia, Swarup

Sweep to the Secret: A Constant Propagation Attack on Logic Locking Proceedings Article

In: 2019 Asian Hardware Oriented Security and Trust Symposium (AsianHOST), pp. 1-6, 2019.

Abstract | Links | BibTeX

Shamsi, Kaveh; Pan, David Z.; Jin, Yier

IcySAT: Improved SAT-based Attacks on Cyclic Locked Circuits Proceedings Article

In: 2019 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), pp. 1-7, IEEE, 2019.

Abstract | Links | BibTeX

Shamsi, Kaveh; Li, Meng; Plaks, Kenneth; Fazzari, Saverio; Pan, David Z.; Jin, Yier

IP Protection and Supply Chain Security through Logic Obfuscation: A Systematic Overview Journal Article

In: ACM Transactions on Design Automation of Electronic Systems (TODAES), vol. 24, no. 6, pp. 1-36, 2019.

Abstract | Links | BibTeX

Li, Meng; Shamsi, Kaveh; Meade, Travis; Zhao, Zheng; Yu, Bei; Jin, Yier; Pan, David Z.

Provably Secure Camouflaging Strategy for IC Protection Journal Article

In: IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, vol. 38, no. 8, pp. 1399-1412, 2019.

Abstract | Links | BibTeX

Shamsi, Kaveh; Pan, David Z.; Jin, Yier

On the Impossibility of Approximation-Resilient Circuit Locking Proceedings Article

In: 2019 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), pp. 161-170, 2019.

Abstract | Links | BibTeX

Chakraborty, Prabuddha; Cruz, Jonathan; Bhunia, Swarup

SURF: Joint Structural Functional Attack on Logic Locking Proceedings Article

In: 2019 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), pp. 181-190, 2019.

Abstract | Links | BibTeX

Shamsi, Kaveh; Meade, Travis; Li, Meng; Pan, David Z.; Jin, Yier

On the Approximation Resiliency of Logic Locking and IC Camouflaging Schemes Journal Article

In: IEEE Transactions on Information Forensics and Security (TIFS), vol. 14, no. 2, pp. 347-359, 2019.

Abstract | Links | BibTeX

Takarabt, Sofiane; Schaub, Alexander; Facon, Adrien; Guilley, Sylvain; Sauvage, Laurent; Souissi, Youssef; Mathieu, Yves

Cache-Timing Attacks Still Threaten IoT Devices Proceedings Article

In: Codes, Cryptology and Information Security, pp. 13–30, Springer International Publishing, Cham, 2019, ISBN: 978-3-030-16458-4.

Abstract | Links | BibTeX

Carré, Sébastien; Facon, Adrien; Guilley, Sylvain; Takarabt, Sofiane; Schaub, Alexander; Souissi, Youssef

Cache-Timing Attack Detection and Prevention Proceedings Article

In: Constructive Side-Channel Analysis and Secure Design, pp. 13–21, Springer International Publishing, Cham, 2019, ISBN: 978-3-030-16350-1.

Abstract | Links | BibTeX

Bruneau, Nicolas; Christen, Charles; Danger, Jean-Luc; Facon, Adrien; Guilley, Sylvain

Security Evaluation Against Side-Channel Analysis at Compilation Time Proceedings Article

In: pp. 129–148, Springer International Publishing, Cham, 2019, ISBN: 978-3-030-36237-9.

Abstract | Links | BibTeX

Facon, Adrien; Guilley, Sylvain; Lec'hvien, Matthieu; Marion, Damien; Perianin, Thomas

Binary Data Analysis for Source Code Leakage Assessment Proceedings Article

In: Innovative Security Solutions for Information Technology and Communications, pp. 391–409, Springer International Publishing, Cham, 2019, ISBN: 978-3-030-12942-2.

Abstract | Links | BibTeX

Souissi, Youssef; Facon, Adrien; Guilley, Sylvain

Virtual Security Evaluation Proceedings Article

In: Carlet, Claude; Guilley, Sylvain; Nitaj, Abderrahmane; Souidi, El Mamoun (Ed.): Codes, Cryptology and Information Security, pp. 3–12, Springer International Publishing, Cham, 2019, ISBN: 978-3-030-16458-4.

Abstract | Links | BibTeX

Chakraborty, Prabuddha; Cruz, Jonathan; Bhunia, Swarup

SAIL: Machine Learning Guided Structural Analysis Attack on Hardware Obfuscation Proceedings Article

In: 2018 Asian Hardware Oriented Security and Trust Symposium (AsianHOST), pp. 56-61, 2018.

Abstract | Links | BibTeX

Azar, Kimia Zamiri; Kamali, Hadi Mardani; Homayoun, Houman; Sasan, Avesta

SMT Attack: Next Generation Attack on Obfuscated Circuits with Capabilities and Performance Beyond the SAT Attacks Journal Article

In: IACR Transactions on Cryptographic Hardware and Embedded Systems, vol. 2019, no. 1, pp. 97-122, 2018.

Abstract | Links | BibTeX

Takarabt, Sofiane; Chibani, Kais; Facon, Adrien; Guilley, Sylvain; Mathieu, Yves; Sauvage, Laurent; Souissi, Youssef

Pre-silicon Embedded System Evaluation as New EDA Tool for Security Verification Proceedings Article

In: 2018 IEEE 3rd International Verification and Security Workshop (IVSW), pp. 74-79, 2018.

Abstract | Links | BibTeX

Meade, Travis; Zhao, Zheng; Zhang, Shaojie; Pan, David Z.; Jin, Yier

Revisit Sequential Logic Obfuscation: Attacks and Defenses Proceedings Article

In: 2017 IEEE International Symposium on Circuits and Systems (ISCAS), pp. 1-4, IEEE, Baltimore, MD, USA , 2017.

Abstract | Links | BibTeX