loading
Papers Papers/2022 Papers Papers/2022

Research.Publish.Connect.

Paper

Authors: Jeffrey T. Mcdonald 1 ; Jennifer Parnell 1 ; Todd R. Andel 1 and Samuel H. Russ 2

Affiliations: 1 Department of Computer Science, University of South Alabama, Mobile, AL, U.S.A. ; 2 Department of Electrical and Computer Engineering, University of South Alabama, Mobile, AL, U.S.A.

Keyword(s): Component Identification, Obfuscation, Digital Logic Circuits, Intellectual Property Protection, Subcircuit Enumeration.

Abstract: Hardware security has become a concern as the risk of intellectual property (IP) theft, malicious alteration, and counterfeiting has increased. Malicious reverse engineering is a common tool used to achieve such goals; thus, the need arises to quantify effectiveness and limits of both circuit protection techniques and adversarial analysis tools. Aspects of physical reverse engineering are well studied and these techniques result in netlist extraction that details gate-level information from an integrated circuit (IC) artifact. Specification recovery from the netlist is a harder problem with more open research questions. In this paper, we focus on the more narrow question of how to recover design-level logic components that were used to build an IC. Such analysis assumes the library of known component building blocks can be identified and that an adversary has successfully accomplished netlist extraction. Likewise, techniques exist to harden IC’s against reverse engineering through ob fuscating transformations, particularly those that target component hiding. We report results of a case study analysis that compares effectiveness of component hiding algorithms against adversarial recovery approaches. As a contribution, we delineate six new approaches for subcircuit enumeration that extend a known algorithm for enumerating candidate components, seeking to improve number of potential candidates in obfuscated circuits. Our study examines algorithm performance in terms of ability to correctly identify original components and analysis time overhead. The study uses four different obfuscation approaches that target component hiding in a set of four benchmark circuits with well defined building blocks. Results indicate that all four hiding approaches are effective at increasing analysis run-time when algorithmic component identification is used, and two of the four were able to hide 95% of original components from our seven studied algorithms. (More)

CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 3.149.26.169

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Mcdonald, J.; Parnell, J.; Andel, T. and Russ, S. (2022). Effectiveness of Adversarial Component Recovery in Protected Netlist Circuit Designs. In Proceedings of the 19th International Conference on Security and Cryptography - SECRYPT; ISBN 978-989-758-590-6; ISSN 2184-7711, SciTePress, pages 181-192. DOI: 10.5220/0011275400003283

@conference{secrypt22,
author={Jeffrey T. Mcdonald. and Jennifer Parnell. and Todd R. Andel. and Samuel H. Russ.},
title={Effectiveness of Adversarial Component Recovery in Protected Netlist Circuit Designs},
booktitle={Proceedings of the 19th International Conference on Security and Cryptography - SECRYPT},
year={2022},
pages={181-192},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0011275400003283},
isbn={978-989-758-590-6},
issn={2184-7711},
}

TY - CONF

JO - Proceedings of the 19th International Conference on Security and Cryptography - SECRYPT
TI - Effectiveness of Adversarial Component Recovery in Protected Netlist Circuit Designs
SN - 978-989-758-590-6
IS - 2184-7711
AU - Mcdonald, J.
AU - Parnell, J.
AU - Andel, T.
AU - Russ, S.
PY - 2022
SP - 181
EP - 192
DO - 10.5220/0011275400003283
PB - SciTePress