Preventing Reverse Engineering using threshold voltage defined multi-input camouflaged gates

Asmit De, Swaroop Ghosh

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    8 Scopus citations

    Abstract

    Semiconductor devices are increasingly getting more vulnerable to counterfeiting due to Reverse Engineering (RE) of Intellectual Property (IP). Securing the IPs from counterfeiting is an important goal towards trustworthy computing. Camouflaging of logic gates is a well-known technique to prevent an adversary from de-layering the chip and stealing IP. Among other techniques, threshold voltage modulation has been proposed to realize 2-input camouflaging logic in both static and dynamic logic gate families. Since threshold voltages are asserted during fabrication and are difficult to identify during RE, the adversary will be forced to launch brute-force search. In this paper, we extend the concept of threshold-voltage defined logic to design 3-input static camouflaged gates capable of performing six Boolean functions (NAND, NOR, AOI, OAI, XOR, XNOR). Simulation results show an average of 3.03× delay overhead and 12.33× power overhead compared to standard CMOS gates. A methodology to design multi-input camouflaged gate is also proposed using a similar technique. Finally, we perform a threat analysis on the camouflaged gate to assess the security and integrity of the design by identifying temperature sensitivity and power signature as potential side channels.

    Original languageEnglish (US)
    Title of host publication2017 IEEE International Symposium on Technologies for Homeland Security, HST 2017
    PublisherInstitute of Electrical and Electronics Engineers Inc.
    ISBN (Electronic)9781509063567
    DOIs
    StatePublished - Jun 7 2017
    Event2017 IEEE International Symposium on Technologies for Homeland Security, HST 2017 - Waltham, United States
    Duration: Apr 25 2017Apr 26 2017

    Other

    Other2017 IEEE International Symposium on Technologies for Homeland Security, HST 2017
    CountryUnited States
    CityWaltham
    Period4/25/174/26/17

    All Science Journal Classification (ASJC) codes

    • Computer Networks and Communications
    • Computer Science Applications
    • Computer Vision and Pattern Recognition
    • Safety Research

    Fingerprint Dive into the research topics of 'Preventing Reverse Engineering using threshold voltage defined multi-input camouflaged gates'. Together they form a unique fingerprint.

  • Cite this

    De, A., & Ghosh, S. (2017). Preventing Reverse Engineering using threshold voltage defined multi-input camouflaged gates. In 2017 IEEE International Symposium on Technologies for Homeland Security, HST 2017 [7943443] Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/THS.2017.7943443