Graph-based analysis for hardware obfuscation through logic locking

Global distribution of Integrated Circuit (IC) supply chain has raised concerns on security threats, such as insertion of hardware trojan, Intellectual Property (IP) piracy, and over-production. Investigation into manufactured IC chips and obfuscation on IP designs are two effective approaches to ad...

Full description

Saved in:
Bibliographic Details
Main Author: Huang, Erdong
Other Authors: Gwee Bah Hwee
Format: Final Year Project
Language:English
Published: Nanyang Technological University 2023
Subjects:
Online Access:https://hdl.handle.net/10356/172427
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Nanyang Technological University
Language: English
id sg-ntu-dr.10356-172427
record_format dspace
spelling sg-ntu-dr.10356-1724272023-12-15T15:42:34Z Graph-based analysis for hardware obfuscation through logic locking Huang, Erdong Gwee Bah Hwee School of Electrical and Electronic Engineering Temasek Laboratories @ NTU ebhgwee@ntu.edu.sg Engineering::Electrical and electronic engineering::Electronic circuits Global distribution of Integrated Circuit (IC) supply chain has raised concerns on security threats, such as insertion of hardware trojan, Intellectual Property (IP) piracy, and over-production. Investigation into manufactured IC chips and obfuscation on IP designs are two effective approaches to address these concerns. For the investigation into manufactured IC chips, in this paper, we proposed a standard cell recognition process, which is fully automated and with 100% accuracy. For obfuscation on IP designs, we made our contributions by revealing the vulnerability of a recently proposed Logic Locking (LL) scheme, D-MUX, using our RNN (LSTM)-based models. Testing is conducted on the ISCAS-85 benchmark circuits. Comparisons are made across different components of the node encoding. With the most comprehensive node encoding, our model successfully predicts D-MUX key values at up to 98% accuracy. Bachelor of Engineering (Electrical and Electronic Engineering) 2023-12-11T05:13:09Z 2023-12-11T05:13:09Z 2023 Final Year Project (FYP) Huang, E. (2023). Graph-based analysis for hardware obfuscation through logic locking. Final Year Project (FYP), Nanyang Technological University, Singapore. https://hdl.handle.net/10356/172427 https://hdl.handle.net/10356/172427 en application/pdf Nanyang Technological University
institution Nanyang Technological University
building NTU Library
continent Asia
country Singapore
Singapore
content_provider NTU Library
collection DR-NTU
language English
topic Engineering::Electrical and electronic engineering::Electronic circuits
spellingShingle Engineering::Electrical and electronic engineering::Electronic circuits
Huang, Erdong
Graph-based analysis for hardware obfuscation through logic locking
description Global distribution of Integrated Circuit (IC) supply chain has raised concerns on security threats, such as insertion of hardware trojan, Intellectual Property (IP) piracy, and over-production. Investigation into manufactured IC chips and obfuscation on IP designs are two effective approaches to address these concerns. For the investigation into manufactured IC chips, in this paper, we proposed a standard cell recognition process, which is fully automated and with 100% accuracy. For obfuscation on IP designs, we made our contributions by revealing the vulnerability of a recently proposed Logic Locking (LL) scheme, D-MUX, using our RNN (LSTM)-based models. Testing is conducted on the ISCAS-85 benchmark circuits. Comparisons are made across different components of the node encoding. With the most comprehensive node encoding, our model successfully predicts D-MUX key values at up to 98% accuracy.
author2 Gwee Bah Hwee
author_facet Gwee Bah Hwee
Huang, Erdong
format Final Year Project
author Huang, Erdong
author_sort Huang, Erdong
title Graph-based analysis for hardware obfuscation through logic locking
title_short Graph-based analysis for hardware obfuscation through logic locking
title_full Graph-based analysis for hardware obfuscation through logic locking
title_fullStr Graph-based analysis for hardware obfuscation through logic locking
title_full_unstemmed Graph-based analysis for hardware obfuscation through logic locking
title_sort graph-based analysis for hardware obfuscation through logic locking
publisher Nanyang Technological University
publishDate 2023
url https://hdl.handle.net/10356/172427
_version_ 1787136485279924224