Graph-based analysis for hardware obfuscation through logic locking
Global distribution of Integrated Circuit (IC) supply chain has raised concerns on security threats, such as insertion of hardware trojan, Intellectual Property (IP) piracy, and over-production. Investigation into manufactured IC chips and obfuscation on IP designs are two effective approaches to ad...
Saved in:
Main Author: | |
---|---|
Other Authors: | |
Format: | Final Year Project |
Language: | English |
Published: |
Nanyang Technological University
2023
|
Subjects: | |
Online Access: | https://hdl.handle.net/10356/172427 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
id |
sg-ntu-dr.10356-172427 |
---|---|
record_format |
dspace |
spelling |
sg-ntu-dr.10356-1724272023-12-15T15:42:34Z Graph-based analysis for hardware obfuscation through logic locking Huang, Erdong Gwee Bah Hwee School of Electrical and Electronic Engineering Temasek Laboratories @ NTU ebhgwee@ntu.edu.sg Engineering::Electrical and electronic engineering::Electronic circuits Global distribution of Integrated Circuit (IC) supply chain has raised concerns on security threats, such as insertion of hardware trojan, Intellectual Property (IP) piracy, and over-production. Investigation into manufactured IC chips and obfuscation on IP designs are two effective approaches to address these concerns. For the investigation into manufactured IC chips, in this paper, we proposed a standard cell recognition process, which is fully automated and with 100% accuracy. For obfuscation on IP designs, we made our contributions by revealing the vulnerability of a recently proposed Logic Locking (LL) scheme, D-MUX, using our RNN (LSTM)-based models. Testing is conducted on the ISCAS-85 benchmark circuits. Comparisons are made across different components of the node encoding. With the most comprehensive node encoding, our model successfully predicts D-MUX key values at up to 98% accuracy. Bachelor of Engineering (Electrical and Electronic Engineering) 2023-12-11T05:13:09Z 2023-12-11T05:13:09Z 2023 Final Year Project (FYP) Huang, E. (2023). Graph-based analysis for hardware obfuscation through logic locking. Final Year Project (FYP), Nanyang Technological University, Singapore. https://hdl.handle.net/10356/172427 https://hdl.handle.net/10356/172427 en application/pdf Nanyang Technological University |
institution |
Nanyang Technological University |
building |
NTU Library |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
NTU Library |
collection |
DR-NTU |
language |
English |
topic |
Engineering::Electrical and electronic engineering::Electronic circuits |
spellingShingle |
Engineering::Electrical and electronic engineering::Electronic circuits Huang, Erdong Graph-based analysis for hardware obfuscation through logic locking |
description |
Global distribution of Integrated Circuit (IC) supply chain has raised concerns on security threats, such as insertion of hardware trojan, Intellectual Property (IP) piracy, and over-production. Investigation into manufactured IC chips and obfuscation on IP designs are two effective approaches to address these concerns.
For the investigation into manufactured IC chips, in this paper, we proposed a standard cell recognition process, which is fully automated and with 100% accuracy.
For obfuscation on IP designs, we made our contributions by revealing the vulnerability of a recently proposed Logic Locking (LL) scheme, D-MUX, using our RNN (LSTM)-based models. Testing is conducted on the ISCAS-85 benchmark circuits. Comparisons are made across different components of the node encoding. With the most comprehensive node encoding, our model successfully predicts D-MUX key values at up to 98% accuracy. |
author2 |
Gwee Bah Hwee |
author_facet |
Gwee Bah Hwee Huang, Erdong |
format |
Final Year Project |
author |
Huang, Erdong |
author_sort |
Huang, Erdong |
title |
Graph-based analysis for hardware obfuscation through logic locking |
title_short |
Graph-based analysis for hardware obfuscation through logic locking |
title_full |
Graph-based analysis for hardware obfuscation through logic locking |
title_fullStr |
Graph-based analysis for hardware obfuscation through logic locking |
title_full_unstemmed |
Graph-based analysis for hardware obfuscation through logic locking |
title_sort |
graph-based analysis for hardware obfuscation through logic locking |
publisher |
Nanyang Technological University |
publishDate |
2023 |
url |
https://hdl.handle.net/10356/172427 |
_version_ |
1787136485279924224 |