CAD for Assurance of Electronic Systems
 

Overproduction

Description

The rising costs of chip fabrication and increasing design complexity has led to the fabless manufacturing model, where a design house typically sources pre-designed and pre-verified hardware IPs from different vendors including third party IP’s (3PIP’s), integrates them into a system-on-chip (SoC), and outsource the final layout to an off-shore foundry (untrusted) for fabrication. Although this trend has been beneficial in reducing cost and time of production, it has resulted in a plethora of security issues. One of such issues is overproduction of IC’s by untrusted off-shore foundry. Any adversary at the foundry with access to the final GDSII file of the IC design can overproduce the design or sell it to a third party. To overcome this issue, several locking and camouflaging tools such as SURF, SWEEP, LEGO, SAIL, NEOS, NETA, and ObfusGEM have been developed.

Related Tools

Publications

Sengupta, Anirban

Cryptography driven IP steganography for DSP Hardware Accelerators Book Forthcoming

Forthcoming, ISBN: 978-1-83953-306-8.

BibTeX

Sengupta, Anirban

Key-triggered Hash-chaining based Encoded Hardware Steganography for Securing DSP Hardware Accelerators Book Forthcoming

Forthcoming, ISBN: 978-1-83953-306-8.

BibTeX

Rathor, Mahendra; Sengupta, Anirban

IP Core Steganography Using Switch Based Key-Driven Hash-Chaining and Encoding for Securing DSP Kernels Used in CE Systems Journal Article

In: IEEE Transactions on Consumer Electronics, vol. 66, no. 3, pp. 251-260, 2020, ISSN: 1558-4127.

Abstract | Links | BibTeX

Zuzak, Michael; Srivastava, Ankur

ObfusGEM: Enhancing Processor Design Obfuscation Through Security-Aware On-Chip Memory and Data Path Design Proceedings Article

In: International Symposium on Memory Systems (MEMSYS), 2020.

BibTeX

Sengupta, Anirban; Rathor, Mahendra

Structural Obfuscation and Crypto-Steganography-Based Secured JPEG Compression Hardware for Medical Imaging Systems Journal Article

In: IEEE Access, vol. 8, pp. 6543-6565, 2020, ISSN: 2169-3536.

Abstract | Links | BibTeX

Rathor, Mahendra; Sengupta, Anirban

Design Flow of Secured N-Point DFT Application Specific Processor Using Obfuscation and Steganography Journal Article

In: IEEE Letters of the Computer Society, vol. 3, no. 1, pp. 13-16, 2020, ISSN: 2573-9689.

Abstract | Links | BibTeX

Alaql, Abdulrahman; Forte, Domenic; Bhunia, Swarup

Sweep to the Secret: A Constant Propagation Attack on Logic Locking Proceedings Article

In: 2019 Asian Hardware Oriented Security and Trust Symposium (AsianHOST), pp. 1-6, 2019.

Abstract | Links | BibTeX

Sengupta, Anirban; Rathor, Mahendra

Crypto-Based Dual-Phase Hardware Steganography for Securing IP cores Journal Article

In: IEEE Letters of the Computer Society, vol. 2, no. 4, pp. 32-35, 2019, ISSN: 2573-9689.

Abstract | Links | BibTeX

Shamsi, Kaveh; Pan, David Z.; Jin, Yier

IcySAT: Improved SAT-based Attacks on Cyclic Locked Circuits Proceedings Article

In: 2019 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), pp. 1-7, IEEE, 2019.

Abstract | Links | BibTeX

Sengupta, Anirban; Rathor, Mahendra

IP Core Steganography for Protecting DSP Kernels Used in CE Systems Journal Article

In: IEEE Transactions on Consumer Electronics, vol. 65, no. 4, pp. 506-515, 2019, ISSN: 1558-4127.

Abstract | Links | BibTeX

Shamsi, Kaveh; Li, Meng; Plaks, Kenneth; Fazzari, Saverio; Pan, David Z.; Jin, Yier

IP Protection and Supply Chain Security through Logic Obfuscation: A Systematic Overview Journal Article

In: ACM Transactions on Design Automation of Electronic Systems (TODAES), vol. 24, no. 6, pp. 1-36, 2019.

Abstract | Links | BibTeX

Li, Meng; Shamsi, Kaveh; Meade, Travis; Zhao, Zheng; Yu, Bei; Jin, Yier; Pan, David Z.

Provably Secure Camouflaging Strategy for IC Protection Journal Article

In: IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, vol. 38, no. 8, pp. 1399-1412, 2019.

Abstract | Links | BibTeX

Shamsi, Kaveh; Pan, David Z.; Jin, Yier

On the Impossibility of Approximation-Resilient Circuit Locking Proceedings Article

In: 2019 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), pp. 161-170, 2019.

Abstract | Links | BibTeX

Chakraborty, Prabuddha; Cruz, Jonathan; Bhunia, Swarup

SURF: Joint Structural Functional Attack on Logic Locking Proceedings Article

In: 2019 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), pp. 181-190, 2019.

Abstract | Links | BibTeX

Shamsi, Kaveh; Meade, Travis; Li, Meng; Pan, David Z.; Jin, Yier

On the Approximation Resiliency of Logic Locking and IC Camouflaging Schemes Journal Article

In: IEEE Transactions on Information Forensics and Security (TIFS), vol. 14, no. 2, pp. 347-359, 2019.

Abstract | Links | BibTeX

Meade, Travis; Portillo, Jason; Zhang, Shaojie; Jin, Yier

NETA: When IP Fails, Secrets Leak Proceedings Article

In: Proceedings of the 24th Asia and South Pacific Design Automation Conference, pp. 90–95, Association for Computing Machinery, Tokyo, Japan, 2019, ISBN: 9781450360074.

Abstract | Links | BibTeX

Chakraborty, Prabuddha; Cruz, Jonathan; Bhunia, Swarup

SAIL: Machine Learning Guided Structural Analysis Attack on Hardware Obfuscation Proceedings Article

In: 2018 Asian Hardware Oriented Security and Trust Symposium (AsianHOST), pp. 56-61, 2018.

Abstract | Links | BibTeX

Meade, Travis; Shamsi, Kaveh; Le, Thao; Di, Jia; Zhang, Shaojie; Jin, Yier

The Old Frontier of Reverse Engineering: Netlist Partitioning Journal Article

In: Journal of Hardware and Systems Security, vol. 2, no. 3, pp. 201-213, 2018.

Abstract | Links | BibTeX

Meade, Travis; Zhao, Zheng; Zhang, Shaojie; Pan, David Z.; Jin, Yier

Revisit Sequential Logic Obfuscation: Attacks and Defenses Proceedings Article

In: 2017 IEEE International Symposium on Circuits and Systems (ISCAS), pp. 1-4, IEEE, Baltimore, MD, USA , 2017.

Abstract | Links | BibTeX

Meade, Travis; Jin, Yier; Tehranipoor, Mark; Zhang, Shaojie

Gate-Level Netlist Reverse Engineering for Hardware Security: Control Logic Register Identification Proceedings Article

In: 2016 IEEE International Symposium on Circuits and Systems (ISCAS), pp. 1334-1337, IEEE, Montreal, QC, Canada, 2016.

Abstract | Links | BibTeX

Meade, Travis; Zhang, Shaojie; Jin, Yier

Netlist Reverse Engineering for High-Level Functionality Reconstruction Proceedings Article

In: 2016 21st Asia and South Pacific Design Automation Conference (ASP-DAC), pp. 655-660, ASP-DAC IEEE, Macau, 2016, (Best Paper Award).

Abstract | Links | BibTeX