Estimating the Circuit Deobfuscating Runtime based on Graph Deep Learning
Circuit obfuscation is a recently proposed defense mechanism to protect digital integrated circuits (ICs) from reverse engineering by using camouflaged gates i.e., logic gates whose functionality cannot be precisely determined by the attacker. There have been effective schemes such as satisfiability...
Gespeichert in:
Hauptverfasser: | , , , , , , |
---|---|
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | |
container_start_page | |
container_title | |
container_volume | |
creator | Chen, Zhiqian Kolhe, Gaurav Rafatirad, Setareh D, Sai Manoj P Homayoun, Houman Zhao, Liang Lu, Chang-Tien |
description | Circuit obfuscation is a recently proposed defense mechanism to protect
digital integrated circuits (ICs) from reverse engineering by using camouflaged
gates i.e., logic gates whose functionality cannot be precisely determined by
the attacker. There have been effective schemes such as satisfiability-checking
(SAT)-based attacks that can potentially decrypt obfuscated circuits, called
deobfuscation. Deobfuscation runtime could have a large span ranging from few
milliseconds to thousands of years or more, depending on the number and layouts
of the ICs and camouflaged gates. And hence accurately pre-estimating the
deobfuscation runtime is highly crucial for the defenders to maximize it and
optimize their defense. However, estimating the deobfuscation runtime is a
challenging task due to 1) the complexity and heterogeneity of graph-structured
circuit, 2) the unknown and sophisticated mechanisms of the attackers for
deobfuscation. To address the above mentioned challenges, this work proposes
the first machine-learning framework that predicts the deobfuscation runtime
based on graph deep learning techniques. Specifically, we design a new model,
ICNet with new input and convolution layers to characterize and extract graph
frequencies from ICs, which are then integrated by heterogeneous deep
fully-connected layers to obtain final output. ICNet is an end-to-end framework
which can automatically extract the determinant features for deobfuscation
runtime. Extensive experiments demonstrate its effectiveness and efficiency. |
doi_str_mv | 10.48550/arxiv.1902.05357 |
format | Article |
fullrecord | <record><control><sourceid>arxiv_GOX</sourceid><recordid>TN_cdi_arxiv_primary_1902_05357</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>1902_05357</sourcerecordid><originalsourceid>FETCH-LOGICAL-a677-7edc79692e8aa00de361945d4d9fb20959962063a98a7d8e45f6131175a2333c3</originalsourceid><addsrcrecordid>eNotj8FOwzAQRH3hgAofwAn_QILtje3sEYVSKkVCQr1Hm3hDLUEaOQmCvye0nOYwT6N5QtxplRelteqB0nf8yjUqkysL1l-L_Xaa4yfNcXiX85FlFVO3xFk-8antl6m7NG_LsFIsW5o4yNMgd4nG4wrxKGumNKzQjbjq6WPi2__ciMPz9lC9ZPXrbl891hk57zPPofPo0HBJpFRgcBoLG4qAfWsUWkRnlAPCknwoubC906C1t2QAoIONuL_Mnl2aMa3v00_z59ScneAXqBpF4Q</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>Estimating the Circuit Deobfuscating Runtime based on Graph Deep Learning</title><source>arXiv.org</source><creator>Chen, Zhiqian ; Kolhe, Gaurav ; Rafatirad, Setareh ; D, Sai Manoj P ; Homayoun, Houman ; Zhao, Liang ; Lu, Chang-Tien</creator><creatorcontrib>Chen, Zhiqian ; Kolhe, Gaurav ; Rafatirad, Setareh ; D, Sai Manoj P ; Homayoun, Houman ; Zhao, Liang ; Lu, Chang-Tien</creatorcontrib><description>Circuit obfuscation is a recently proposed defense mechanism to protect
digital integrated circuits (ICs) from reverse engineering by using camouflaged
gates i.e., logic gates whose functionality cannot be precisely determined by
the attacker. There have been effective schemes such as satisfiability-checking
(SAT)-based attacks that can potentially decrypt obfuscated circuits, called
deobfuscation. Deobfuscation runtime could have a large span ranging from few
milliseconds to thousands of years or more, depending on the number and layouts
of the ICs and camouflaged gates. And hence accurately pre-estimating the
deobfuscation runtime is highly crucial for the defenders to maximize it and
optimize their defense. However, estimating the deobfuscation runtime is a
challenging task due to 1) the complexity and heterogeneity of graph-structured
circuit, 2) the unknown and sophisticated mechanisms of the attackers for
deobfuscation. To address the above mentioned challenges, this work proposes
the first machine-learning framework that predicts the deobfuscation runtime
based on graph deep learning techniques. Specifically, we design a new model,
ICNet with new input and convolution layers to characterize and extract graph
frequencies from ICs, which are then integrated by heterogeneous deep
fully-connected layers to obtain final output. ICNet is an end-to-end framework
which can automatically extract the determinant features for deobfuscation
runtime. Extensive experiments demonstrate its effectiveness and efficiency.</description><identifier>DOI: 10.48550/arxiv.1902.05357</identifier><language>eng</language><subject>Computer Science - Artificial Intelligence ; Computer Science - Computational Geometry ; Computer Science - Cryptography and Security ; Computer Science - Learning</subject><creationdate>2019-02</creationdate><rights>http://arxiv.org/licenses/nonexclusive-distrib/1.0</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>228,230,776,881</link.rule.ids><linktorsrc>$$Uhttps://arxiv.org/abs/1902.05357$$EView_record_in_Cornell_University$$FView_record_in_$$GCornell_University$$Hfree_for_read</linktorsrc><backlink>$$Uhttps://doi.org/10.48550/arXiv.1902.05357$$DView paper in arXiv$$Hfree_for_read</backlink></links><search><creatorcontrib>Chen, Zhiqian</creatorcontrib><creatorcontrib>Kolhe, Gaurav</creatorcontrib><creatorcontrib>Rafatirad, Setareh</creatorcontrib><creatorcontrib>D, Sai Manoj P</creatorcontrib><creatorcontrib>Homayoun, Houman</creatorcontrib><creatorcontrib>Zhao, Liang</creatorcontrib><creatorcontrib>Lu, Chang-Tien</creatorcontrib><title>Estimating the Circuit Deobfuscating Runtime based on Graph Deep Learning</title><description>Circuit obfuscation is a recently proposed defense mechanism to protect
digital integrated circuits (ICs) from reverse engineering by using camouflaged
gates i.e., logic gates whose functionality cannot be precisely determined by
the attacker. There have been effective schemes such as satisfiability-checking
(SAT)-based attacks that can potentially decrypt obfuscated circuits, called
deobfuscation. Deobfuscation runtime could have a large span ranging from few
milliseconds to thousands of years or more, depending on the number and layouts
of the ICs and camouflaged gates. And hence accurately pre-estimating the
deobfuscation runtime is highly crucial for the defenders to maximize it and
optimize their defense. However, estimating the deobfuscation runtime is a
challenging task due to 1) the complexity and heterogeneity of graph-structured
circuit, 2) the unknown and sophisticated mechanisms of the attackers for
deobfuscation. To address the above mentioned challenges, this work proposes
the first machine-learning framework that predicts the deobfuscation runtime
based on graph deep learning techniques. Specifically, we design a new model,
ICNet with new input and convolution layers to characterize and extract graph
frequencies from ICs, which are then integrated by heterogeneous deep
fully-connected layers to obtain final output. ICNet is an end-to-end framework
which can automatically extract the determinant features for deobfuscation
runtime. Extensive experiments demonstrate its effectiveness and efficiency.</description><subject>Computer Science - Artificial Intelligence</subject><subject>Computer Science - Computational Geometry</subject><subject>Computer Science - Cryptography and Security</subject><subject>Computer Science - Learning</subject><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2019</creationdate><recordtype>article</recordtype><sourceid>GOX</sourceid><recordid>eNotj8FOwzAQRH3hgAofwAn_QILtje3sEYVSKkVCQr1Hm3hDLUEaOQmCvye0nOYwT6N5QtxplRelteqB0nf8yjUqkysL1l-L_Xaa4yfNcXiX85FlFVO3xFk-8antl6m7NG_LsFIsW5o4yNMgd4nG4wrxKGumNKzQjbjq6WPi2__ciMPz9lC9ZPXrbl891hk57zPPofPo0HBJpFRgcBoLG4qAfWsUWkRnlAPCknwoubC906C1t2QAoIONuL_Mnl2aMa3v00_z59ScneAXqBpF4Q</recordid><startdate>20190214</startdate><enddate>20190214</enddate><creator>Chen, Zhiqian</creator><creator>Kolhe, Gaurav</creator><creator>Rafatirad, Setareh</creator><creator>D, Sai Manoj P</creator><creator>Homayoun, Houman</creator><creator>Zhao, Liang</creator><creator>Lu, Chang-Tien</creator><scope>AKY</scope><scope>GOX</scope></search><sort><creationdate>20190214</creationdate><title>Estimating the Circuit Deobfuscating Runtime based on Graph Deep Learning</title><author>Chen, Zhiqian ; Kolhe, Gaurav ; Rafatirad, Setareh ; D, Sai Manoj P ; Homayoun, Houman ; Zhao, Liang ; Lu, Chang-Tien</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-a677-7edc79692e8aa00de361945d4d9fb20959962063a98a7d8e45f6131175a2333c3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2019</creationdate><topic>Computer Science - Artificial Intelligence</topic><topic>Computer Science - Computational Geometry</topic><topic>Computer Science - Cryptography and Security</topic><topic>Computer Science - Learning</topic><toplevel>online_resources</toplevel><creatorcontrib>Chen, Zhiqian</creatorcontrib><creatorcontrib>Kolhe, Gaurav</creatorcontrib><creatorcontrib>Rafatirad, Setareh</creatorcontrib><creatorcontrib>D, Sai Manoj P</creatorcontrib><creatorcontrib>Homayoun, Houman</creatorcontrib><creatorcontrib>Zhao, Liang</creatorcontrib><creatorcontrib>Lu, Chang-Tien</creatorcontrib><collection>arXiv Computer Science</collection><collection>arXiv.org</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Chen, Zhiqian</au><au>Kolhe, Gaurav</au><au>Rafatirad, Setareh</au><au>D, Sai Manoj P</au><au>Homayoun, Houman</au><au>Zhao, Liang</au><au>Lu, Chang-Tien</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Estimating the Circuit Deobfuscating Runtime based on Graph Deep Learning</atitle><date>2019-02-14</date><risdate>2019</risdate><abstract>Circuit obfuscation is a recently proposed defense mechanism to protect
digital integrated circuits (ICs) from reverse engineering by using camouflaged
gates i.e., logic gates whose functionality cannot be precisely determined by
the attacker. There have been effective schemes such as satisfiability-checking
(SAT)-based attacks that can potentially decrypt obfuscated circuits, called
deobfuscation. Deobfuscation runtime could have a large span ranging from few
milliseconds to thousands of years or more, depending on the number and layouts
of the ICs and camouflaged gates. And hence accurately pre-estimating the
deobfuscation runtime is highly crucial for the defenders to maximize it and
optimize their defense. However, estimating the deobfuscation runtime is a
challenging task due to 1) the complexity and heterogeneity of graph-structured
circuit, 2) the unknown and sophisticated mechanisms of the attackers for
deobfuscation. To address the above mentioned challenges, this work proposes
the first machine-learning framework that predicts the deobfuscation runtime
based on graph deep learning techniques. Specifically, we design a new model,
ICNet with new input and convolution layers to characterize and extract graph
frequencies from ICs, which are then integrated by heterogeneous deep
fully-connected layers to obtain final output. ICNet is an end-to-end framework
which can automatically extract the determinant features for deobfuscation
runtime. Extensive experiments demonstrate its effectiveness and efficiency.</abstract><doi>10.48550/arxiv.1902.05357</doi><oa>free_for_read</oa></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | DOI: 10.48550/arxiv.1902.05357 |
ispartof | |
issn | |
language | eng |
recordid | cdi_arxiv_primary_1902_05357 |
source | arXiv.org |
subjects | Computer Science - Artificial Intelligence Computer Science - Computational Geometry Computer Science - Cryptography and Security Computer Science - Learning |
title | Estimating the Circuit Deobfuscating Runtime based on Graph Deep Learning |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-27T00%3A30%3A26IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-arxiv_GOX&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Estimating%20the%20Circuit%20Deobfuscating%20Runtime%20based%20on%20Graph%20Deep%20Learning&rft.au=Chen,%20Zhiqian&rft.date=2019-02-14&rft_id=info:doi/10.48550/arxiv.1902.05357&rft_dat=%3Carxiv_GOX%3E1902_05357%3C/arxiv_GOX%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |