We gratefully acknowledge support from
the Simons Foundation and member institutions.
Full-text links:

Download:

Current browse context:

cs.CR

Change to browse by:

References & Citations

DBLP - CS Bibliography

Bookmark

(what is this?)
CiteULike logo BibSonomy logo Mendeley logo del.icio.us logo Digg logo Reddit logo

Computer Science > Cryptography and Security

Title: TimingCamouflage+: Netlist Security Enhancement with Unconventional Timing (with Appendix)

Abstract: With recent advances in reverse engineering, attackers can reconstruct a netlist to counterfeit chips by opening the die and scanning all layers of authentic chips. This relatively easy counterfeiting is made possible by the use of the standard simple clocking scheme, where all combinational blocks function within one clock period, so that a netlist of combinational logic gates and flip-flops is sufficient to duplicate a design. In this paper, we propose to invalidate the assumption that a netlist completely represents the function of a circuit with unconventional timing. With the introduced wave-pipelining paths, attackers have to capture gate and interconnect delays during reverse engineering, or to test a huge number of combinational paths to identify the wave-pipelining paths. To hinder the test-based attack, we construct false paths with wave-pipelining to increase the counterfeiting challenge. Experimental results confirm that wave-pipelining true paths and false paths can be constructed in benchmark circuits successfully with only a negligible cost, thus thwarting the potential attack techniques.
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
DOI: 10.1109/TCAD.2020.2974338
Cite as: arXiv:2003.00862 [cs.CR]
  (or arXiv:2003.00862v1 [cs.CR] for this version)

Submission history

From: Bing Li [view email]
[v1] Mon, 2 Mar 2020 13:10:03 GMT (153kb,D)

Link back to: arXiv, form interface, contact.