Circuit analysis for camouflage netlists

The importance of intellectual property (IP) in Integrated Circuit (IC) design has steadily increased over the years as the demand for semiconductor ICs increased, especially after the global COVID-19 pandemic. Electronic Design Automation (EDA) tools have also become more powerful and easily availa...

Full description

Saved in:
Bibliographic Details
Main Author: Liu, YuCong
Other Authors: Gwee Bah Hwee
Format: Final Year Project
Language:English
Published: Nanyang Technological University 2021
Subjects:
Online Access:https://hdl.handle.net/10356/148797
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Nanyang Technological University
Language: English
id sg-ntu-dr.10356-148797
record_format dspace
spelling sg-ntu-dr.10356-1487972023-07-07T18:30:28Z Circuit analysis for camouflage netlists Liu, YuCong Gwee Bah Hwee School of Electrical and Electronic Engineering HoWeng Geng ebhgwee@ntu.edu.sg Engineering::Electrical and electronic engineering The importance of intellectual property (IP) in Integrated Circuit (IC) design has steadily increased over the years as the demand for semiconductor ICs increased, especially after the global COVID-19 pandemic. Electronic Design Automation (EDA) tools have also become more powerful and easily available, enabling newer fab-less design houses to work independently to compete directly with the bigger players in the same market. This leads to stiff competition between design companies to compete for the best designs in a lucrative market. Traditionally, reverse engineering in IC design is used for verification purposes. However, malicious parties are now enabled with power tools such as advanced imagine equipment and techniques, Artificial Intelligence (AI) algorithms, and readily available EDA software to steal the IP from their competitors. The most straight-forward algorithm (Brute-force) is not very effective for reverse engineering as the common IC chips that we use consist of billions of transistor in one package. Thus, the brute-force attack is too long, making the mentioned algorithm not economically viable for the malicious party. However, as technology improves with faster processing ICs and an improvement in the brute-force algorithm, results show that there is still potential in this method of attacking camouflage circuits. In this project, a seven-functioned standard logic cell is proposed using the “Dummy Via” hardware obfuscation method and a python Verilog simulator is made to implement an effective brute-force algorithm to attack the camouflaged cell. Bachelor of Engineering (Electrical and Electronic Engineering) 2021-05-17T12:59:36Z 2021-05-17T12:59:36Z 2021 Final Year Project (FYP) Liu, Y. (2021). Circuit analysis for camouflage netlists. Final Year Project (FYP), Nanyang Technological University, Singapore. https://hdl.handle.net/10356/148797 https://hdl.handle.net/10356/148797 en A2071-201 application/pdf Nanyang Technological University
institution Nanyang Technological University
building NTU Library
continent Asia
country Singapore
Singapore
content_provider NTU Library
collection DR-NTU
language English
topic Engineering::Electrical and electronic engineering
spellingShingle Engineering::Electrical and electronic engineering
Liu, YuCong
Circuit analysis for camouflage netlists
description The importance of intellectual property (IP) in Integrated Circuit (IC) design has steadily increased over the years as the demand for semiconductor ICs increased, especially after the global COVID-19 pandemic. Electronic Design Automation (EDA) tools have also become more powerful and easily available, enabling newer fab-less design houses to work independently to compete directly with the bigger players in the same market. This leads to stiff competition between design companies to compete for the best designs in a lucrative market. Traditionally, reverse engineering in IC design is used for verification purposes. However, malicious parties are now enabled with power tools such as advanced imagine equipment and techniques, Artificial Intelligence (AI) algorithms, and readily available EDA software to steal the IP from their competitors. The most straight-forward algorithm (Brute-force) is not very effective for reverse engineering as the common IC chips that we use consist of billions of transistor in one package. Thus, the brute-force attack is too long, making the mentioned algorithm not economically viable for the malicious party. However, as technology improves with faster processing ICs and an improvement in the brute-force algorithm, results show that there is still potential in this method of attacking camouflage circuits. In this project, a seven-functioned standard logic cell is proposed using the “Dummy Via” hardware obfuscation method and a python Verilog simulator is made to implement an effective brute-force algorithm to attack the camouflaged cell.
author2 Gwee Bah Hwee
author_facet Gwee Bah Hwee
Liu, YuCong
format Final Year Project
author Liu, YuCong
author_sort Liu, YuCong
title Circuit analysis for camouflage netlists
title_short Circuit analysis for camouflage netlists
title_full Circuit analysis for camouflage netlists
title_fullStr Circuit analysis for camouflage netlists
title_full_unstemmed Circuit analysis for camouflage netlists
title_sort circuit analysis for camouflage netlists
publisher Nanyang Technological University
publishDate 2021
url https://hdl.handle.net/10356/148797
_version_ 1772826837648408576