Estimating the Circuit Deobfuscating Runtime based on Graph Deep Learning

Circuit obfuscation is a recently proposed defense mechanism to protect digital integrated circuits (ICs) from reverse engineering by using camouflaged gates i.e., logic gates whose functionality cannot be precisely determined by the attacker. There have been effective schemes such as satisfiability...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Chen, Zhiqian, Kolhe, Gaurav, Rafatirad, Setareh, D, Sai Manoj P, Homayoun, Houman, Zhao, Liang, Lu, Chang-Tien
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator Chen, Zhiqian
Kolhe, Gaurav
Rafatirad, Setareh
D, Sai Manoj P
Homayoun, Houman
Zhao, Liang
Lu, Chang-Tien
description Circuit obfuscation is a recently proposed defense mechanism to protect digital integrated circuits (ICs) from reverse engineering by using camouflaged gates i.e., logic gates whose functionality cannot be precisely determined by the attacker. There have been effective schemes such as satisfiability-checking (SAT)-based attacks that can potentially decrypt obfuscated circuits, called deobfuscation. Deobfuscation runtime could have a large span ranging from few milliseconds to thousands of years or more, depending on the number and layouts of the ICs and camouflaged gates. And hence accurately pre-estimating the deobfuscation runtime is highly crucial for the defenders to maximize it and optimize their defense. However, estimating the deobfuscation runtime is a challenging task due to 1) the complexity and heterogeneity of graph-structured circuit, 2) the unknown and sophisticated mechanisms of the attackers for deobfuscation. To address the above mentioned challenges, this work proposes the first machine-learning framework that predicts the deobfuscation runtime based on graph deep learning techniques. Specifically, we design a new model, ICNet with new input and convolution layers to characterize and extract graph frequencies from ICs, which are then integrated by heterogeneous deep fully-connected layers to obtain final output. ICNet is an end-to-end framework which can automatically extract the determinant features for deobfuscation runtime. Extensive experiments demonstrate its effectiveness and efficiency.
doi_str_mv 10.48550/arxiv.1902.05357
format Article
fullrecord <record><control><sourceid>arxiv_GOX</sourceid><recordid>TN_cdi_arxiv_primary_1902_05357</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>1902_05357</sourcerecordid><originalsourceid>FETCH-LOGICAL-a677-7edc79692e8aa00de361945d4d9fb20959962063a98a7d8e45f6131175a2333c3</originalsourceid><addsrcrecordid>eNotj8FOwzAQRH3hgAofwAn_QILtje3sEYVSKkVCQr1Hm3hDLUEaOQmCvye0nOYwT6N5QtxplRelteqB0nf8yjUqkysL1l-L_Xaa4yfNcXiX85FlFVO3xFk-8antl6m7NG_LsFIsW5o4yNMgd4nG4wrxKGumNKzQjbjq6WPi2__ciMPz9lC9ZPXrbl891hk57zPPofPo0HBJpFRgcBoLG4qAfWsUWkRnlAPCknwoubC906C1t2QAoIONuL_Mnl2aMa3v00_z59ScneAXqBpF4Q</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>Estimating the Circuit Deobfuscating Runtime based on Graph Deep Learning</title><source>arXiv.org</source><creator>Chen, Zhiqian ; Kolhe, Gaurav ; Rafatirad, Setareh ; D, Sai Manoj P ; Homayoun, Houman ; Zhao, Liang ; Lu, Chang-Tien</creator><creatorcontrib>Chen, Zhiqian ; Kolhe, Gaurav ; Rafatirad, Setareh ; D, Sai Manoj P ; Homayoun, Houman ; Zhao, Liang ; Lu, Chang-Tien</creatorcontrib><description>Circuit obfuscation is a recently proposed defense mechanism to protect digital integrated circuits (ICs) from reverse engineering by using camouflaged gates i.e., logic gates whose functionality cannot be precisely determined by the attacker. There have been effective schemes such as satisfiability-checking (SAT)-based attacks that can potentially decrypt obfuscated circuits, called deobfuscation. Deobfuscation runtime could have a large span ranging from few milliseconds to thousands of years or more, depending on the number and layouts of the ICs and camouflaged gates. And hence accurately pre-estimating the deobfuscation runtime is highly crucial for the defenders to maximize it and optimize their defense. However, estimating the deobfuscation runtime is a challenging task due to 1) the complexity and heterogeneity of graph-structured circuit, 2) the unknown and sophisticated mechanisms of the attackers for deobfuscation. To address the above mentioned challenges, this work proposes the first machine-learning framework that predicts the deobfuscation runtime based on graph deep learning techniques. Specifically, we design a new model, ICNet with new input and convolution layers to characterize and extract graph frequencies from ICs, which are then integrated by heterogeneous deep fully-connected layers to obtain final output. ICNet is an end-to-end framework which can automatically extract the determinant features for deobfuscation runtime. Extensive experiments demonstrate its effectiveness and efficiency.</description><identifier>DOI: 10.48550/arxiv.1902.05357</identifier><language>eng</language><subject>Computer Science - Artificial Intelligence ; Computer Science - Computational Geometry ; Computer Science - Cryptography and Security ; Computer Science - Learning</subject><creationdate>2019-02</creationdate><rights>http://arxiv.org/licenses/nonexclusive-distrib/1.0</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>228,230,776,881</link.rule.ids><linktorsrc>$$Uhttps://arxiv.org/abs/1902.05357$$EView_record_in_Cornell_University$$FView_record_in_$$GCornell_University$$Hfree_for_read</linktorsrc><backlink>$$Uhttps://doi.org/10.48550/arXiv.1902.05357$$DView paper in arXiv$$Hfree_for_read</backlink></links><search><creatorcontrib>Chen, Zhiqian</creatorcontrib><creatorcontrib>Kolhe, Gaurav</creatorcontrib><creatorcontrib>Rafatirad, Setareh</creatorcontrib><creatorcontrib>D, Sai Manoj P</creatorcontrib><creatorcontrib>Homayoun, Houman</creatorcontrib><creatorcontrib>Zhao, Liang</creatorcontrib><creatorcontrib>Lu, Chang-Tien</creatorcontrib><title>Estimating the Circuit Deobfuscating Runtime based on Graph Deep Learning</title><description>Circuit obfuscation is a recently proposed defense mechanism to protect digital integrated circuits (ICs) from reverse engineering by using camouflaged gates i.e., logic gates whose functionality cannot be precisely determined by the attacker. There have been effective schemes such as satisfiability-checking (SAT)-based attacks that can potentially decrypt obfuscated circuits, called deobfuscation. Deobfuscation runtime could have a large span ranging from few milliseconds to thousands of years or more, depending on the number and layouts of the ICs and camouflaged gates. And hence accurately pre-estimating the deobfuscation runtime is highly crucial for the defenders to maximize it and optimize their defense. However, estimating the deobfuscation runtime is a challenging task due to 1) the complexity and heterogeneity of graph-structured circuit, 2) the unknown and sophisticated mechanisms of the attackers for deobfuscation. To address the above mentioned challenges, this work proposes the first machine-learning framework that predicts the deobfuscation runtime based on graph deep learning techniques. Specifically, we design a new model, ICNet with new input and convolution layers to characterize and extract graph frequencies from ICs, which are then integrated by heterogeneous deep fully-connected layers to obtain final output. ICNet is an end-to-end framework which can automatically extract the determinant features for deobfuscation runtime. Extensive experiments demonstrate its effectiveness and efficiency.</description><subject>Computer Science - Artificial Intelligence</subject><subject>Computer Science - Computational Geometry</subject><subject>Computer Science - Cryptography and Security</subject><subject>Computer Science - Learning</subject><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2019</creationdate><recordtype>article</recordtype><sourceid>GOX</sourceid><recordid>eNotj8FOwzAQRH3hgAofwAn_QILtje3sEYVSKkVCQr1Hm3hDLUEaOQmCvye0nOYwT6N5QtxplRelteqB0nf8yjUqkysL1l-L_Xaa4yfNcXiX85FlFVO3xFk-8antl6m7NG_LsFIsW5o4yNMgd4nG4wrxKGumNKzQjbjq6WPi2__ciMPz9lC9ZPXrbl891hk57zPPofPo0HBJpFRgcBoLG4qAfWsUWkRnlAPCknwoubC906C1t2QAoIONuL_Mnl2aMa3v00_z59ScneAXqBpF4Q</recordid><startdate>20190214</startdate><enddate>20190214</enddate><creator>Chen, Zhiqian</creator><creator>Kolhe, Gaurav</creator><creator>Rafatirad, Setareh</creator><creator>D, Sai Manoj P</creator><creator>Homayoun, Houman</creator><creator>Zhao, Liang</creator><creator>Lu, Chang-Tien</creator><scope>AKY</scope><scope>GOX</scope></search><sort><creationdate>20190214</creationdate><title>Estimating the Circuit Deobfuscating Runtime based on Graph Deep Learning</title><author>Chen, Zhiqian ; Kolhe, Gaurav ; Rafatirad, Setareh ; D, Sai Manoj P ; Homayoun, Houman ; Zhao, Liang ; Lu, Chang-Tien</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-a677-7edc79692e8aa00de361945d4d9fb20959962063a98a7d8e45f6131175a2333c3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2019</creationdate><topic>Computer Science - Artificial Intelligence</topic><topic>Computer Science - Computational Geometry</topic><topic>Computer Science - Cryptography and Security</topic><topic>Computer Science - Learning</topic><toplevel>online_resources</toplevel><creatorcontrib>Chen, Zhiqian</creatorcontrib><creatorcontrib>Kolhe, Gaurav</creatorcontrib><creatorcontrib>Rafatirad, Setareh</creatorcontrib><creatorcontrib>D, Sai Manoj P</creatorcontrib><creatorcontrib>Homayoun, Houman</creatorcontrib><creatorcontrib>Zhao, Liang</creatorcontrib><creatorcontrib>Lu, Chang-Tien</creatorcontrib><collection>arXiv Computer Science</collection><collection>arXiv.org</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Chen, Zhiqian</au><au>Kolhe, Gaurav</au><au>Rafatirad, Setareh</au><au>D, Sai Manoj P</au><au>Homayoun, Houman</au><au>Zhao, Liang</au><au>Lu, Chang-Tien</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Estimating the Circuit Deobfuscating Runtime based on Graph Deep Learning</atitle><date>2019-02-14</date><risdate>2019</risdate><abstract>Circuit obfuscation is a recently proposed defense mechanism to protect digital integrated circuits (ICs) from reverse engineering by using camouflaged gates i.e., logic gates whose functionality cannot be precisely determined by the attacker. There have been effective schemes such as satisfiability-checking (SAT)-based attacks that can potentially decrypt obfuscated circuits, called deobfuscation. Deobfuscation runtime could have a large span ranging from few milliseconds to thousands of years or more, depending on the number and layouts of the ICs and camouflaged gates. And hence accurately pre-estimating the deobfuscation runtime is highly crucial for the defenders to maximize it and optimize their defense. However, estimating the deobfuscation runtime is a challenging task due to 1) the complexity and heterogeneity of graph-structured circuit, 2) the unknown and sophisticated mechanisms of the attackers for deobfuscation. To address the above mentioned challenges, this work proposes the first machine-learning framework that predicts the deobfuscation runtime based on graph deep learning techniques. Specifically, we design a new model, ICNet with new input and convolution layers to characterize and extract graph frequencies from ICs, which are then integrated by heterogeneous deep fully-connected layers to obtain final output. ICNet is an end-to-end framework which can automatically extract the determinant features for deobfuscation runtime. Extensive experiments demonstrate its effectiveness and efficiency.</abstract><doi>10.48550/arxiv.1902.05357</doi><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier DOI: 10.48550/arxiv.1902.05357
ispartof
issn
language eng
recordid cdi_arxiv_primary_1902_05357
source arXiv.org
subjects Computer Science - Artificial Intelligence
Computer Science - Computational Geometry
Computer Science - Cryptography and Security
Computer Science - Learning
title Estimating the Circuit Deobfuscating Runtime based on Graph Deep Learning
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-27T00%3A30%3A26IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-arxiv_GOX&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Estimating%20the%20Circuit%20Deobfuscating%20Runtime%20based%20on%20Graph%20Deep%20Learning&rft.au=Chen,%20Zhiqian&rft.date=2019-02-14&rft_id=info:doi/10.48550/arxiv.1902.05357&rft_dat=%3Carxiv_GOX%3E1902_05357%3C/arxiv_GOX%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true