Circuit analysis for camouflage netlists

The importance of intellectual property (IP) in Integrated Circuit (IC) design has steadily increased over the years as the demand for semiconductor ICs increased, especially after the global COVID-19 pandemic. Electronic Design Automation (EDA) tools have also become more powerful and easily availa...

全面介紹

Saved in:
書目詳細資料
主要作者: Liu, YuCong
其他作者: Gwee Bah Hwee
格式: Final Year Project
語言:English
出版: Nanyang Technological University 2021
主題:
在線閱讀:https://hdl.handle.net/10356/148797
標簽: 添加標簽
沒有標簽, 成為第一個標記此記錄!
機構: Nanyang Technological University
語言: English
id sg-ntu-dr.10356-148797
record_format dspace
spelling sg-ntu-dr.10356-1487972023-07-07T18:30:28Z Circuit analysis for camouflage netlists Liu, YuCong Gwee Bah Hwee School of Electrical and Electronic Engineering HoWeng Geng ebhgwee@ntu.edu.sg Engineering::Electrical and electronic engineering The importance of intellectual property (IP) in Integrated Circuit (IC) design has steadily increased over the years as the demand for semiconductor ICs increased, especially after the global COVID-19 pandemic. Electronic Design Automation (EDA) tools have also become more powerful and easily available, enabling newer fab-less design houses to work independently to compete directly with the bigger players in the same market. This leads to stiff competition between design companies to compete for the best designs in a lucrative market. Traditionally, reverse engineering in IC design is used for verification purposes. However, malicious parties are now enabled with power tools such as advanced imagine equipment and techniques, Artificial Intelligence (AI) algorithms, and readily available EDA software to steal the IP from their competitors. The most straight-forward algorithm (Brute-force) is not very effective for reverse engineering as the common IC chips that we use consist of billions of transistor in one package. Thus, the brute-force attack is too long, making the mentioned algorithm not economically viable for the malicious party. However, as technology improves with faster processing ICs and an improvement in the brute-force algorithm, results show that there is still potential in this method of attacking camouflage circuits. In this project, a seven-functioned standard logic cell is proposed using the “Dummy Via” hardware obfuscation method and a python Verilog simulator is made to implement an effective brute-force algorithm to attack the camouflaged cell. Bachelor of Engineering (Electrical and Electronic Engineering) 2021-05-17T12:59:36Z 2021-05-17T12:59:36Z 2021 Final Year Project (FYP) Liu, Y. (2021). Circuit analysis for camouflage netlists. Final Year Project (FYP), Nanyang Technological University, Singapore. https://hdl.handle.net/10356/148797 https://hdl.handle.net/10356/148797 en A2071-201 application/pdf Nanyang Technological University
institution Nanyang Technological University
building NTU Library
continent Asia
country Singapore
Singapore
content_provider NTU Library
collection DR-NTU
language English
topic Engineering::Electrical and electronic engineering
spellingShingle Engineering::Electrical and electronic engineering
Liu, YuCong
Circuit analysis for camouflage netlists
description The importance of intellectual property (IP) in Integrated Circuit (IC) design has steadily increased over the years as the demand for semiconductor ICs increased, especially after the global COVID-19 pandemic. Electronic Design Automation (EDA) tools have also become more powerful and easily available, enabling newer fab-less design houses to work independently to compete directly with the bigger players in the same market. This leads to stiff competition between design companies to compete for the best designs in a lucrative market. Traditionally, reverse engineering in IC design is used for verification purposes. However, malicious parties are now enabled with power tools such as advanced imagine equipment and techniques, Artificial Intelligence (AI) algorithms, and readily available EDA software to steal the IP from their competitors. The most straight-forward algorithm (Brute-force) is not very effective for reverse engineering as the common IC chips that we use consist of billions of transistor in one package. Thus, the brute-force attack is too long, making the mentioned algorithm not economically viable for the malicious party. However, as technology improves with faster processing ICs and an improvement in the brute-force algorithm, results show that there is still potential in this method of attacking camouflage circuits. In this project, a seven-functioned standard logic cell is proposed using the “Dummy Via” hardware obfuscation method and a python Verilog simulator is made to implement an effective brute-force algorithm to attack the camouflaged cell.
author2 Gwee Bah Hwee
author_facet Gwee Bah Hwee
Liu, YuCong
format Final Year Project
author Liu, YuCong
author_sort Liu, YuCong
title Circuit analysis for camouflage netlists
title_short Circuit analysis for camouflage netlists
title_full Circuit analysis for camouflage netlists
title_fullStr Circuit analysis for camouflage netlists
title_full_unstemmed Circuit analysis for camouflage netlists
title_sort circuit analysis for camouflage netlists
publisher Nanyang Technological University
publishDate 2021
url https://hdl.handle.net/10356/148797
_version_ 1772826837648408576