Preventing Reverse Engineering using threshold voltage defined multi-input camouflaged gates

Asmit De, Swaroop Ghosh

Research output: Chapter in Book/Report/Conference proceedingConference contribution

12 Scopus citations

Abstract

Semiconductor devices are increasingly getting more vulnerable to counterfeiting due to Reverse Engineering (RE) of Intellectual Property (IP). Securing the IPs from counterfeiting is an important goal towards trustworthy computing. Camouflaging of logic gates is a well-known technique to prevent an adversary from de-layering the chip and stealing IP. Among other techniques, threshold voltage modulation has been proposed to realize 2-input camouflaging logic in both static and dynamic logic gate families. Since threshold voltages are asserted during fabrication and are difficult to identify during RE, the adversary will be forced to launch brute-force search. In this paper, we extend the concept of threshold-voltage defined logic to design 3-input static camouflaged gates capable of performing six Boolean functions (NAND, NOR, AOI, OAI, XOR, XNOR). Simulation results show an average of 3.03× delay overhead and 12.33× power overhead compared to standard CMOS gates. A methodology to design multi-input camouflaged gate is also proposed using a similar technique. Finally, we perform a threat analysis on the camouflaged gate to assess the security and integrity of the design by identifying temperature sensitivity and power signature as potential side channels.

Original languageEnglish (US)
Title of host publication2017 IEEE International Symposium on Technologies for Homeland Security, HST 2017
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781509063567
DOIs
StatePublished - Jun 7 2017
Event2017 IEEE International Symposium on Technologies for Homeland Security, HST 2017 - Waltham, United States
Duration: Apr 25 2017Apr 26 2017

Other

Other2017 IEEE International Symposium on Technologies for Homeland Security, HST 2017
Country/TerritoryUnited States
CityWaltham
Period4/25/174/26/17

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications
  • Computer Science Applications
  • Computer Vision and Pattern Recognition
  • Safety Research

Fingerprint

Dive into the research topics of 'Preventing Reverse Engineering using threshold voltage defined multi-input camouflaged gates'. Together they form a unique fingerprint.

Cite this