• ثبت نام
    • ورود به سامانه
    مشاهده مورد 
    •   صفحهٔ اصلی
    • نشریات انگلیسی
    • The ISC International Journal of Information Security
    • Volume 8, Issue 2
    • مشاهده مورد
    •   صفحهٔ اصلی
    • نشریات انگلیسی
    • The ISC International Journal of Information Security
    • Volume 8, Issue 2
    • مشاهده مورد
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    ASIC design protection against reverse engineering during the fabrication process using automatic netlist obfuscation design flow

    (ندگان)پدیدآور
    Zamanzadeh, Sh.Jahanian, A.
    Thumbnail
    دریافت مدرک مشاهده
    FullText
    اندازه فایل: 
    867.9کیلوبایت
    نوع فايل (MIME): 
    PDF
    نوع مدرک
    Text
    ORIGINAL RESEARCH PAPER
    زبان مدرک
    English
    نمایش کامل رکورد
    چکیده
    Fab-less business model in semiconductor industry has led to serious concerns about trustworthy hardware. In untrusted foundries and manufacturing companies, submitted layout may be analyzed and reverse engineered to steal the information of a design or insert malicious Trojans. Understanding the netlist topology is the ultimate goal of the reverse engineering process. In this paper, we propose a netlist encryption mechanism to hide the interconnect topology inside an IC. Moreover, new special standard cells (Wire Scrambling cells) are designed to play the role of netlist encryption. Furthermore, a design ow is proposed to insert the WS-cells inside the netlist with the aim of maximum obfuscation and minimum overhead. It is worth noting that this mechanism is fully automated with no need to detail information of the functionality and structure of the design. Our proposed mechanism is implemented in an academic physical design framework (EduCAD). Experimental results show that reverse engineering can be hindered considerably in cost of negligible overheads by 23% in area, 3.25% in delay and 14.5% in total wire length. Reverse engineering is evaluated by brute-force attack, and the learned information is 0% and the Hamming distance is approximately 50%.
    کلید واژگان
    Hardware Security
    Netlist Encryption
    Obfuscation
    Reverse Engineering
    IP Piracy

    شماره نشریه
    2
    تاریخ نشر
    2016-07-01
    1395-04-11
    ناشر
    Iranian Society of Cryptology
    سازمان پدید آورنده
    Computer Science and Engineering Department, Shahid Beheshti University, Tehran, Iran
    Computer Science and Engineering Department, Shahid Beheshti University, Tehran, Iran

    شاپا
    2008-2045
    2008-3076
    URI
    https://dx.doi.org/10.22042/isecure.2016.8.2.1
    http://www.isecure-journal.com/article_41774.html
    https://iranjournals.nlai.ir/handle/123456789/73391

    مرور

    همه جای سامانهپایگاه‌ها و مجموعه‌ها بر اساس تاریخ انتشارپدیدآورانعناوینموضوع‌‌هااین مجموعه بر اساس تاریخ انتشارپدیدآورانعناوینموضوع‌‌ها

    حساب من

    ورود به سامانهثبت نام

    آمار

    مشاهده آمار استفاده

    تازه ترین ها

    تازه ترین مدارک
    © کليه حقوق اين سامانه برای سازمان اسناد و کتابخانه ملی ایران محفوظ است
    تماس با ما | ارسال بازخورد
    قدرت یافته توسطسیناوب