Design automation for camouflage circuits
Digital logic circuits are an essential part of any integrated system. However, they are susceptible to malicious parties’ attacks, such as hardware trojans, intellectual property (IP) piracy, reverse engineering. There are various methods available to defend against these attacks, such as integrate...
Saved in:
Main Author: | |
---|---|
Other Authors: | |
Format: | Final Year Project |
Language: | English |
Published: |
Nanyang Technological University
2020
|
Subjects: | |
Online Access: | https://hdl.handle.net/10356/138660 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
id |
sg-ntu-dr.10356-138660 |
---|---|
record_format |
dspace |
spelling |
sg-ntu-dr.10356-1386602023-07-07T18:10:32Z Design automation for camouflage circuits Ng, Chuan Seng Gwee Bah Hwee School of Electrical and Electronic Engineering ebhgwee@ntu.edu.sg Engineering::Electrical and electronic engineering::Electronic circuits Digital logic circuits are an essential part of any integrated system. However, they are susceptible to malicious parties’ attacks, such as hardware trojans, intellectual property (IP) piracy, reverse engineering. There are various methods available to defend against these attacks, such as integrated circuit (IC) camouflaging, design obfuscation, split manufacturing, but the method adopted in the project is to camouflage the logic gates in the digital logic circuit. Even so, the functionality and security of the camouflaged logic gates must be verified and analysed before affirming that the camouflage choices are optimal at least 50% of the time it is utilized. There are three main contributions in this project. The first is the library cell design for camouflaging. This is especially crucial as it details how and what the chosen library cell will be camouflaged into. Next is the methodology flow, which includes the method to implement and utilize the camouflage library cells. The purpose behind and effect of each chosen library cell will also be explained and illustrated. Lastly is the camouflage IC deterrence analysis. The effectiveness of the deterrence is based on the number of library cells chosen to be camouflaged and their location. An analogy of the library cell placement is roadblocks. It is redundant to set up roadblocks for two paths leading to the same immediate destination. Hence, it is more efficient and effective to ensure that roadblocks are set up at every path leading to the end destination. This would result in the minimal number of roadblocks needed to cover the maximum number of paths. This implementation would also lead to a reduced impact on the key parameters of the digital circuit, namely the circuit density, power usage, and circuit speed. However, to ensure that the chosen logic gates are ideal against hindering the attackers, an attack algorithm would be used to decipher the camouflaged circuit. The execution time of the algorithm will be analysed, which is what sets this report apart from the other research papers. By analysing the different execution times for different numbers of chosen logic gates, the ideal number of logic gates to be camouflaged can be determined. Bachelor of Engineering (Electrical and Electronic Engineering) 2020-05-11T07:50:06Z 2020-05-11T07:50:06Z 2020 Final Year Project (FYP) https://hdl.handle.net/10356/138660 en EE4080 application/pdf Nanyang Technological University |
institution |
Nanyang Technological University |
building |
NTU Library |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
NTU Library |
collection |
DR-NTU |
language |
English |
topic |
Engineering::Electrical and electronic engineering::Electronic circuits |
spellingShingle |
Engineering::Electrical and electronic engineering::Electronic circuits Ng, Chuan Seng Design automation for camouflage circuits |
description |
Digital logic circuits are an essential part of any integrated system. However, they are susceptible to malicious parties’ attacks, such as hardware trojans, intellectual property (IP) piracy, reverse engineering. There are various methods available to defend against these attacks, such as integrated circuit (IC) camouflaging, design obfuscation, split manufacturing, but the method adopted in the project is to camouflage the logic gates in the digital logic circuit. Even so, the functionality and security of the camouflaged logic gates must be verified and analysed before affirming that the camouflage choices are optimal at least 50% of the time it is utilized. There are three main contributions in this project. The first is the library cell design for camouflaging. This is especially crucial as it details how and what the chosen library cell will be camouflaged into. Next is the methodology flow, which includes the method to implement and utilize the camouflage library cells. The purpose behind and effect of each chosen library cell will also be explained and illustrated. Lastly is the camouflage IC deterrence analysis. The effectiveness of the deterrence is based on the number of library cells chosen to be camouflaged and their location. An analogy of the library cell placement is roadblocks. It is redundant to set up roadblocks for two paths leading to the same immediate destination. Hence, it is more efficient and effective to ensure that roadblocks are set up at every path leading to the end destination. This would result in the minimal number of roadblocks needed to cover the maximum number of paths. This implementation would also lead to a reduced impact on the key parameters of the digital circuit, namely the circuit density, power usage, and circuit speed. However, to ensure that the chosen logic gates are ideal against hindering the attackers, an attack algorithm would be used to decipher the camouflaged circuit. The execution time of the algorithm will be analysed, which is what sets this report apart from the other research papers. By analysing the different execution times for different numbers of chosen logic gates, the ideal number of logic gates to be camouflaged can be determined. |
author2 |
Gwee Bah Hwee |
author_facet |
Gwee Bah Hwee Ng, Chuan Seng |
format |
Final Year Project |
author |
Ng, Chuan Seng |
author_sort |
Ng, Chuan Seng |
title |
Design automation for camouflage circuits |
title_short |
Design automation for camouflage circuits |
title_full |
Design automation for camouflage circuits |
title_fullStr |
Design automation for camouflage circuits |
title_full_unstemmed |
Design automation for camouflage circuits |
title_sort |
design automation for camouflage circuits |
publisher |
Nanyang Technological University |
publishDate |
2020 |
url |
https://hdl.handle.net/10356/138660 |
_version_ |
1772825976789532672 |