Skip to Main content Skip to Navigation
Book sections

Logic Modification-Based IP Protection Methods: An Overview and a Proposal

Abstract : Intellectual property protection is a major concern for fabless IC designers. Among the proposed protection means, the active ones are preventing counterfeiting and over-usage to occur in the first place. One of the solution to implement an active design data protection scheme is to modify the combinational logic. Several methods are available, called logic encryption, logic obfuscation, logic masking or logic locking. A formal framework is first provided for these notions. We clearly define those four types of logic modification, and give didactic examples. Then, a new method to achieve logic locking is presented. This method, based on graph analysis, allows to select the insertion sites for the extra gates orders of magnitudes faster than existing techniques. We give experimental results following from a practical implementation and discuss design considerations about integration in an overall, more robust, protection scheme. We also consider existing attacks and propose some countermeasures.
Complete list of metadata

Cited literature [24 references]  Display  Hide  Download
Contributor : Nathalie Bochard Connect in order to contact the contributor
Submitted on : Friday, July 28, 2017 - 2:12:51 PM
Last modification on : Saturday, June 25, 2022 - 9:10:45 PM


Files produced by the author(s)


  • HAL Id : ujm-01570115, version 1



Brice Colombier, Lilian Bossuet, David Hely. Logic Modification-Based IP Protection Methods: An Overview and a Proposal. Bossuet, Lilian, Torres, Lionel. Foundations of Hardware IP Protection, 2, Springer, pp.30-64, 2017, 978-3-319-50378-3. ⟨ujm-01570115⟩



Record views


Files downloads