CAPTIVE: Constrained Adversarial Perturbations to Thwart IC Reverse Engineering
-
Published:2023-12-11
Issue:12
Volume:14
Page:656
-
ISSN:2078-2489
-
Container-title:Information
-
language:en
-
Short-container-title:Information
Author:
Zargari Amir Hosein Afandizadeh1, AshrafiAmiri Marzieh1, Seo Minjun1, Pudukotai Dinakarrao Sai Manoj2ORCID, Fouda Mohammed E.1ORCID, Kurdahi Fadi1
Affiliation:
1. Department of Electrical and Computer Engineering, University of California, Irvine, CA 92697, USA 2. Department of Electrical and Computer Engineering, George Mason University, Fairfax, VA 22030, USA
Abstract
Reverse engineering (RE) in Integrated Circuits (IC) is a process in which one will attempt to extract the internals of an IC, extract the circuit structure, and determine the gate-level information of an IC. In general, the RE process can be done for validation as well as Intellectual Property (IP) stealing intentions. In addition, RE also facilitates different illicit activities such as the insertion of hardware Trojan, pirating, or counterfeiting a design, or developing an attack. In this work, we propose an approach to introduce cognitive perturbations, with the aid of adversarial machine learning, to the IC layout that could prevent the RE process from succeeding. We first construct a layer-by-layer image dataset of 45 nm predictive technology. With this dataset, we propose a conventional neural network model called RecoG-Net to recognize the logic gates, which is the first step in RE. RecoG-Net is successful in recognizing the gates with more than 99.7% accuracy. Our thwarting approach utilizes the concept of adversarial attack generation algorithms to generate perturbation. Unlike traditional adversarial attacks in machine learning, the perturbation generation needs to be highly constrained to meet the fab rules such as Design Rule Checking (DRC) Layout vs. Schematic (LVS) checks. Hence, we propose CAPTIVE as a constrained perturbation generation satisfying the DRC. The experiments show that the accuracy of reverse engineering using machine learning techniques can decrease from 100% to approximately 30% based on the adversary generator.
Funder
US National Science Foundation
Subject
Information Systems
Reference40 articles.
1. Chen, J.C., Rau, H., Sun, C.J., Stzeng, H.W., and Chen, C.H. (2009, January 26–29). Workflow design and management for IC supply chain. Proceedings of the International Conference on Networking, Sensing and Control, Okayama, Japan. 2. Hassan, R., Kohle, G., Rafatirad, S., Homayoun, H., and Dinakarrao, S.M.P. (2021, January 1–5). A Cognitive SAT to SAT-Hard Clause Translation-based Logic Obfuscation. Proceedings of the ACM/EDAA/IEEE Design Automation and Test in Europe, Grenoble, France. 3. Torrance, R., and James, D. (2011, January 5–9). The state-of-the-art in semiconductor reverse engineering. Proceedings of the 48th Design Automation Conference, San Diego, CA, USA. 4. Akkaya, N.E.C., Erbagci, B., and Mai, K. (2017, January 2–6). Combatting IC counterfeiting using secure chip odometers. Proceedings of the IEEE International Electron Devices Meeting (IEDM), San Francisco, CA, USA. 5. Dhavlle, A. (2022). Reverse Engineering of Integrated Circuits: Tools and Techniques. arXiv.
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
|
|