Logic Modification-Based IP Protection Methods: An Overview and a Proposal

Abstract : Intellectual property protection is a major concern for fabless IC designers. Among the proposed protection means, the active ones are preventing counterfeiting and over-usage to occur in the first place. One of the solution to implement an active design data protection scheme is to modify the combinational logic. Several methods are available, called logic encryption, logic obfuscation, logic masking or logic locking. A formal framework is first provided for these notions. We clearly define those four types of logic modification, and give didactic examples. Then, a new method to achieve logic locking is presented. This method, based on graph analysis, allows to select the insertion sites for the extra gates orders of magnitudes faster than existing techniques. We give experimental results following from a practical implementation and discuss design considerations about integration in an overall, more robust, protection scheme. We also consider existing attacks and propose some countermeasures.
Complete list of metadatas

Cited literature [24 references]  Display  Hide  Download

https://hal-ujm.archives-ouvertes.fr/ujm-01570115
Contributor : Nathalie Bochard <>
Submitted on : Friday, July 28, 2017 - 2:12:51 PM
Last modification on : Tuesday, December 18, 2018 - 1:18:01 PM

File

Springer_2017.pdf
Files produced by the author(s)

Identifiers

  • HAL Id : ujm-01570115, version 1

Citation

Brice Colombier, Lilian Bossuet, David Hely. Logic Modification-Based IP Protection Methods: An Overview and a Proposal. Bossuet, Lilian, Torres, Lionel. Foundations of Hardware IP Protection, 2, Springer, pp.30-64, 2017, 978-3-319-50378-3. ⟨http://www.springer.com/us/book/9783319503783⟩. ⟨ujm-01570115⟩

Share

Metrics

Record views

272

Files downloads

217