期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
An Efficient Technique to Reverse Engineer Minterm Protection Based Camouflaged Circuit 被引量:1
1
作者 Shan Jiang Ning Xu +1 位作者 Xue-Yan Wang Qiang Zhou 《Journal of Computer Science & Technology》 SCIE EI CSCD 2018年第5期998-1006,共9页
Integrated circuit (IC) camouflaging technique has been applied as a countermeasure against reverse engineering (RE). However, its effectiveness is threatened by a boolean satisfiability (SAT) based de-camouflag... Integrated circuit (IC) camouflaging technique has been applied as a countermeasure against reverse engineering (RE). However, its effectiveness is threatened by a boolean satisfiability (SAT) based de-camouflaging attack, which is able to restore the camouflaged circuit within only minutes. As a defense to the SAT-based de-camouflaging attack, a brand new camouflaging strategy (called CamoPerturb) has been proposed recently, which perturbs one minterm by changing one gate's functionality and then restores the perturbed circuit with a separated camouflaged block, achieving good resistance against the SAT-based attack. In this paper, we analyze the security vulnerabilities of CamoPerturb by illustrating the mechanism of minterm perturbation induced by gate replacement, then propose an attack to restore the changed gate's functionality, and recover the camouflaged circuit. The attack algorithm is facilitated by sensitization and implication principles in automatic test pattern generation (ATPG) techniques. Experimental results demonstrate that our method is able to restore the camouflaged circuits with very little time consumption. 展开更多
关键词 reverse engineering circuit camouflaging sensitization and implication minterm perturbation
原文传递
针对最小项伪装电路的逆向工程攻击方法 被引量:1
2
作者 江姗 徐宁 +1 位作者 王雪岩 周强 《东南大学学报(自然科学版)》 EI CAS CSCD 北大核心 2017年第A01期187-192,共6页
为了进一步提升最小项保护的IC(integrated circuit)伪装策略的安全性,针对其电路结构缺陷提出一种攻击方法,并分析其改进点.首先,对CamoPerturb提出的最小项保护伪装策略的实现技术进行分析,采用通路敏化和逻辑蕴含技术研究逻辑门替换... 为了进一步提升最小项保护的IC(integrated circuit)伪装策略的安全性,针对其电路结构缺陷提出一种攻击方法,并分析其改进点.首先,对CamoPerturb提出的最小项保护伪装策略的实现技术进行分析,采用通路敏化和逻辑蕴含技术研究逻辑门替换引起最小项扰动原理.然后,借鉴FAN算法思想计算出伪装电路中更改的最小项与逻辑门,从而恢复初始电路结构.实验采用ISCAS89基准电路和openSPARC处理器电路,结果表明利用所提方法仅需数ms即可高效地破解CamoPerturb对IC的伪装. 展开更多
关键词 逆向工程 IC伪装 通路敏化及逻辑蕴含 最小项扰动
下载PDF
基于局部逻辑伪装的IC保护方法 被引量:1
3
作者 杨然 高文超 《电子与信息学报》 EI CSCD 北大核心 2021年第9期2466-2473,共8页
集成电路(IC)设计面临逆向工程的攻击,核心专利(IP)和算法被盗用,硬件安全受到威胁。该文提出一种电路伪装方法LPerturb,通过对其局部电路逻辑的扰动,实现IC电路的保护。对电路进行最大独立锥划分(MFFCs),选取被伪装的最大子电路,确保... 集成电路(IC)设计面临逆向工程的攻击,核心专利(IP)和算法被盗用,硬件安全受到威胁。该文提出一种电路伪装方法LPerturb,通过对其局部电路逻辑的扰动,实现IC电路的保护。对电路进行最大独立锥划分(MFFCs),选取被伪装的最大子电路,确保输出逻辑扰动的局部性。针对要扰动锥结点逻辑,从锥中选择被替换的逻辑单元,以最小化代价对进行局部电路逻辑扰动。用多值伪装电路对扰动的逻辑值进行混淆保护,恢复相应的电路逻辑。实验结果表明,该方法能够稳定生成保护电路,具有较好的输出扰动性,能有效抵御SAT去伪装攻击,面积额外开销较小,时延影响可以忽略。 展开更多
关键词 硬件安全 IC电路保护 IC伪装 逻辑混淆 最小项扰动
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部