Privacy Protection of VLSI Circuits through High Level Transformation based Obfuscation

  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract

    This paper focuses on “semiconductor manufacturing obliges greater capital investments, the utilization for contract foundries need developed dramatically, expanding exposure to robbery and unapproved overabundance generation. A significant number of exercises demonstrated that IC piracy has currently turned into a real challenge for the electronics and defense industries. In this manuscript we displays a new approach to configure complicated circuits for digital signal processing (DSP) provisions utilizing high-level transformations, a key-based obfuscating finite-state machine (FSM), and a reconfiguration. The aim is to design DSP circuits, which would harder to reverse engineer. With a few modes for operations for obfuscation where the outputs are expressive from a signal processing point for view, however are functionally inaccurate to preferred perplexity. The design information controls different mode of the circuit process and useful obfuscation will be refined with the utilization of the correct initialization key. Structural obfuscation will be also attained by the recommended procedure through high-level transformations. The effectiveness of suggested procedure will be checked with FIR configuration strong high level obfuscation may be demonstrated and investigated for different key sizes”.



  • Keywords

    Finite state machine, Model Sim.

  • References

      [1] R. S. Chakraborty and S. Bhunia, “RTL hardware IP protection using key-based control and data flow obfuscation,” in Proc. 23rd Int. Conf. VLSI Design, Jan. 2010, pp.405–410.

      [2] R.S. Chakraborty and S. Bhunia, “HARPOON: An obfuscation based SoC design methodology for hardware protection,” IEEE Trans. Comput.-Aided Design Integr. Circuits Syst., vol. 28, no. 10, pp. 1493–1502, Oct.2009.

      [3] R.S.ChakrabortyandS.Bhunia,“Hardwareprotectionandauthenticationthroughnetlistlevelobfuscation,”inProc.Int. Conf. Comput-Aided Design, Nov. 2008, pp. 674–677

      [4] W.P.Griffin,A.Raghunathan,andK.Roy,“CLIP:CircuitlevelICprotectionthroughdirectinjectionofprocessvariations,” IEEE Trans. Very Large Scale Integr. (VLSI) Syst., vol. 20, no. 5, pp. 791–803, May2012.

      [5] F. Koushanfar and Y. Alkabani, “Provably secure obfuscation of diverse watermarks for s equential circuits, ”in Proc. Int. Symp. Hardw.-Oriented Security Trust, Jun. 2010, pp.42–47.




Article ID: 27957
DOI: 10.14419/ijet.v7i4.19.27957

Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.