Logic Modification-Based IP Protection Methods: An Overview and a Proposal - Archive ouverte HAL Access content directly
Book Sections Year : 2017

Logic Modification-Based IP Protection Methods: An Overview and a Proposal

(1) , (1) , (2)
1
2

Abstract

Intellectual property protection is a major concern for fabless IC designers. Among the proposed protection means, the active ones are preventing counterfeiting and over-usage to occur in the first place. One of the solution to implement an active design data protection scheme is to modify the combinational logic. Several methods are available, called logic encryption, logic obfuscation, logic masking or logic locking. A formal framework is first provided for these notions. We clearly define those four types of logic modification, and give didactic examples. Then, a new method to achieve logic locking is presented. This method, based on graph analysis, allows to select the insertion sites for the extra gates orders of magnitudes faster than existing techniques. We give experimental results following from a practical implementation and discuss design considerations about integration in an overall, more robust, protection scheme. We also consider existing attacks and propose some countermeasures.
Fichier principal
Vignette du fichier
Springer_2017.pdf (479.35 Ko) Télécharger le fichier
Origin : Files produced by the author(s)
Loading...

Dates and versions

ujm-01570115 , version 1 (28-07-2017)

Identifiers

  • HAL Id : ujm-01570115 , version 1

Cite

Brice Colombier, Lilian Bossuet, David Hely. Logic Modification-Based IP Protection Methods: An Overview and a Proposal. Bossuet, Lilian, Torres, Lionel. Foundations of Hardware IP Protection, 2, Springer, pp.30-64, 2017, 978-3-319-50378-3. ⟨ujm-01570115⟩
220 View
298 Download

Share

Gmail Facebook Twitter LinkedIn More