Graph-based analysis for hardware obfuscation through logic locking
Global distribution of Integrated Circuit (IC) supply chain has raised concerns on security threats, such as insertion of hardware trojan, Intellectual Property (IP) piracy, and over-production. Investigation into manufactured IC chips and obfuscation on IP designs are two effective approaches to ad...
Saved in:
Main Author: | |
---|---|
Other Authors: | |
Format: | Final Year Project |
Language: | English |
Published: |
Nanyang Technological University
2023
|
Subjects: | |
Online Access: | https://hdl.handle.net/10356/172427 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
Summary: | Global distribution of Integrated Circuit (IC) supply chain has raised concerns on security threats, such as insertion of hardware trojan, Intellectual Property (IP) piracy, and over-production. Investigation into manufactured IC chips and obfuscation on IP designs are two effective approaches to address these concerns.
For the investigation into manufactured IC chips, in this paper, we proposed a standard cell recognition process, which is fully automated and with 100% accuracy.
For obfuscation on IP designs, we made our contributions by revealing the vulnerability of a recently proposed Logic Locking (LL) scheme, D-MUX, using our RNN (LSTM)-based models. Testing is conducted on the ISCAS-85 benchmark circuits. Comparisons are made across different components of the node encoding. With the most comprehensive node encoding, our model successfully predicts D-MUX key values at up to 98% accuracy. |
---|