...
首页> 外文期刊>IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems >Incremental SAT-Based Reverse Engineering of Camouflaged Logic Circuits
【24h】

Incremental SAT-Based Reverse Engineering of Camouflaged Logic Circuits

机译:基于增量SAT的伪装逻辑电路逆向工程

获取原文
获取原文并翻译 | 示例
           

摘要

Layout-level gate or routing camouflaging techniques have attracted interest as countermeasures against reverse engineering of combinational logic. In order to minimize area overhead, typically only a subset of gate or routing components are camouflaged, and each camouflaged component layout can implement one of a few different functions or connections. The security of camouflaging relies on the difficulty of learning the overall combinational logic function without knowing the functions implemented by the individual camouflaged components of the circuit. In this paper, we expand our previous work on using incremental SAT solving to reconstruct the logical function of a circuit with camouflaged components. Our algorithm uses the standard attacker model in which an adversary knows only the noncamouflaged component functions, and has the ability to query the circuit to learn the correct output vector for any input vector. Our results demonstrate a speedup in average runtime over the best known existing deobfuscation algorithm prior to this technique. The results presented go beyond our previous work by showing that this technique, previously applied only to a particular style of gate camouflaging, is general and can be used to deobfuscate three different proposed styles of camouflaging. We give results to quantify the effectiveness of camouflaging techniques on a variety of ISCAS-85 benchmark circuits.
机译:作为对组合逻辑进行逆向工程的对策,布局级门或路由伪装技术引起了人们的兴趣。为了最小化区域开销,通常仅伪装门或路由组件的子集,并且每个伪装组件的布局都可以实现几种不同功能或连接之一。伪装的安全性依赖于学习整体组合逻辑功能而不知道电路的各个伪装部件所实现的功能的难度。在本文中,我们扩展了以前的工作,即使用增量SAT求解来重建具有伪装元件的电路的逻辑功能。我们的算法使用标准的攻击者模型,在该模型中,对手仅了解未伪装的组件功能,并且能够查询电路以了解任何输入矢量的正确输出矢量。我们的结果表明,在此技术之前,这种方法比已知的现有最佳去模糊算法平均运行时间要快。所呈现的结果超出了我们以前的工作,表明该技术以前仅应用于特定类型的门伪装,是通用的,可用于对三种不同的拟议伪装样式进行模糊处理。我们给出结果以量化各种ISCAS-85基准电路上的伪装技术的有效性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号