Visible to the public IP Protection and Supply Chain Security through Logic Obfuscation: A Systematic Overview

TitleIP Protection and Supply Chain Security through Logic Obfuscation: A Systematic Overview
Publication TypeJournal Article
Year of Publication2019
AuthorsShamsi, Kaveh, Li, Meng, Plaks, Kenneth, Fazzari, Saverio, Pan, David Z., Jin, Yier
JournalACM Transactions on Design Automation of Electronic Systems (TODAES)
Date PublishedSeptember 2019
KeywordsCollaboration, composability, hardware security, Human Behavior, human factors, IC camouflaging, logic locking, logic obfuscation, Metrics, policy-based governance, pubcrawl, resilience, Resiliency, Scalability, supply chain risk assessment

The globalization of the semiconductor supply chain introduces ever-increasing security and privacy risks. Two major concerns are IP theft through reverse engineering and malicious modification of the design. The latter concern in part relies on successful reverse engineering of the design as well. IC camouflaging and logic locking are two of the techniques under research that can thwart reverse engineering by end-users or foundries. However, developing low overhead locking/camouflaging schemes that can resist the ever-evolving state-of-the-art attacks has been a challenge for several years. This article provides a comprehensive review of the state of the art with respect to locking/camouflaging techniques. We start by defining a systematic threat model for these techniques and discuss how various real-world scenarios relate to each threat model. We then discuss the evolution of generic algorithmic attacks under each threat model eventually leading to the strongest existing attacks. The article then systematizes defences and along the way discusses attacks that are more specific to certain kinds of locking/camouflaging. The article then concludes by discussing open problems and future directions.

Citation Keyshamsi_ip_2019