A Module-Level Configuration Methodology for Programmable Camouflaged Logic

Author:

Wang Jianfeng1,Chen Zhonghao1,Zhang Jiahao1,Xu Yixin2,Yu Tongguang2,Zheng Ziheng1,Ye Enze1,George Sumitha3,Yang Huazhong1,Liu Yongpan1,Ni Kai4,Narayanan Vijaykrishnan2,Li Xueqing1

Affiliation:

1. Tsinghua University, China

2. Pennsylvania State University, USA

3. North Dakota State University, USA

4. University of Notre Dame, USA

Abstract

Logic camouflage is a widely adopted technique that mitigates the threat of intellectual property (IP) piracy and overproduction in the integrated circuit (IC) supply chain. Camouflaged logic achieves functional obfuscation through physical-level ambiguity and post-manufacturing programmability. However, discussions on programmability are confined to the level of logic cells/gates, limiting the broader-scale application of logic camouflage. In this work, we propose a novel module-level configuration methodology for programmable camouflaged logic that can be implemented without additional hardware ports and with negligible resources. We prove theoretically that the configuration of the programmable camouflaged logic cells can be achieved through the inputs and netlist of the original module. Further, we propose a novel lightweight ferroelectric FET (FeFET)-based reconfigurable logic gate (rGate) family and apply it to the proposed methodology. With the flexible replacement and the proposed configuration-aware conversion algorithm, this work is characterized by the input-only programming scheme as well as the combination of high output error rate and point-function-like defense. Evaluations show an average of >95% of the alternative rGate location for camouflage, which is sufficient for the security-aware design. We illustrate the exponential complexity in function state traversal and the enhanced defense capability of locked blackbox against SAT attacks compared to key-based methods. We also preserve an evident output Hamming distance and introduce negligible hardware overheads in both gate-level and module-level evaluations under typical benchmarks.

Publisher

Association for Computing Machinery (ACM)

Subject

Electrical and Electronic Engineering,Computer Graphics and Computer-Aided Design,Computer Science Applications

Reference48 articles.

1. A secure camouflaged logic family using post-manufacturing programming with a 3.6GHz adder prototype in 65nm CMOS at 1V nominal VDD

2. K. Z. Azar and H. M. Kamali. 2022. IP Protection through Logic Locking: What to Expect from the State-of-the-arts. (2022). K. Z. Azar and H. M. Kamali. 2022. IP Protection through Logic Locking: What to Expect from the State-of-the-arts. (2022).

3. From Cryptography to Logic Locking: A Survey on the Architecture Evolution of Secure Scan Chains

4. A. Aziz et  al . 2016. Physics-Based Circuit-Compatible SPICE Model for Ferroelectric Transistors . IEEE Electron Device Lett .( 2016 ), 1–1. A. Aziz et al. 2016. Physics-Based Circuit-Compatible SPICE Model for Ferroelectric Transistors. IEEE Electron Device Lett.(2016), 1–1.

5. 17.5 A 3T1R nonvolatile TCAM using MLC ReRAM with Sub-1ns search time

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3