Logic encryption: A fault analysis perspective

The globalization of Integrated Circuit (IC) design flow is making it easy for rogue elements in the supply chain to pirate ICs, overbuild ICs, and insert hardware trojans; the IC industry is losing approximately 4 billion annually [1], [2]. One way to protect the ICs from these attacks is to encryp...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Rajendran, J., Pino, Y., Sinanoglu, O., Karri, R.
Format: Tagungsbericht
Sprache:eng
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 958
container_issue
container_start_page 953
container_title
container_volume
creator Rajendran, J.
Pino, Y.
Sinanoglu, O.
Karri, R.
description The globalization of Integrated Circuit (IC) design flow is making it easy for rogue elements in the supply chain to pirate ICs, overbuild ICs, and insert hardware trojans; the IC industry is losing approximately 4 billion annually [1], [2]. One way to protect the ICs from these attacks is to encrypt the design by inserting additional gates such that correct outputs are produced only when specific inputs are applied to these gates. The state-of-the-art logic encryption technique inserts gates randomly into the design [3] and does not necessarily ensure that wrong keys corrupt the outputs. Our technique ensures that wrong keys corrupt the outputs. We relate logic encryption to fault propagation analysis in IC testing and develop a fault analysis based logic encryption technique. This technique achieves 50% Hamming distance between the correct and wrong outputs (ideal case) when a wrong key is applied. Furthermore, this 50% Hamming distance target is achieved by using a smaller number of additional gates when compared to random logic encryption.
doi_str_mv 10.1109/DATE.2012.6176634
format Conference Proceeding
fullrecord <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_6176634</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>6176634</ieee_id><sourcerecordid>6176634</sourcerecordid><originalsourceid>FETCH-LOGICAL-i90t-3129252244dfa9939d9db1e9ba6f31fba84ff813a8d6297ad746e7d885223d1c3</originalsourceid><addsrcrecordid>eNotj8tqwzAURNUXNEnzAaUb_4BdXUmW7u3OpOkDDN14H2RLKiquYyy3kL9vQrOZWcyZgWHsHngBwOnxuWq2heAgCg1Ga6ku2FISAkcOCJdsAWWJ-RGFK7YEVRojTnp9CiTPoSS4ZeuUvjjnAEYh4YIV9f4zdpkfuukwznE_PGVVFuxPP2d2sP0hxZSNfkqj7-b46-_YTbB98uuzr1jzsm02b3n98fq-qeo8Ep9zCYJEKYRSLlgiSY5cC55aq4OE0FpUISBIi04LMtYZpb1xiMeOdNDJFXv4n43e-904xW87HXbn2_IPuhtGYg</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Logic encryption: A fault analysis perspective</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Rajendran, J. ; Pino, Y. ; Sinanoglu, O. ; Karri, R.</creator><creatorcontrib>Rajendran, J. ; Pino, Y. ; Sinanoglu, O. ; Karri, R.</creatorcontrib><description>The globalization of Integrated Circuit (IC) design flow is making it easy for rogue elements in the supply chain to pirate ICs, overbuild ICs, and insert hardware trojans; the IC industry is losing approximately 4 billion annually [1], [2]. One way to protect the ICs from these attacks is to encrypt the design by inserting additional gates such that correct outputs are produced only when specific inputs are applied to these gates. The state-of-the-art logic encryption technique inserts gates randomly into the design [3] and does not necessarily ensure that wrong keys corrupt the outputs. Our technique ensures that wrong keys corrupt the outputs. We relate logic encryption to fault propagation analysis in IC testing and develop a fault analysis based logic encryption technique. This technique achieves 50% Hamming distance between the correct and wrong outputs (ideal case) when a wrong key is applied. Furthermore, this 50% Hamming distance target is achieved by using a smaller number of additional gates when compared to random logic encryption.</description><identifier>ISSN: 1530-1591</identifier><identifier>ISBN: 1457721457</identifier><identifier>ISBN: 9781457721458</identifier><identifier>EISSN: 1558-1101</identifier><identifier>EISBN: 3981080181</identifier><identifier>EISBN: 9783981080186</identifier><identifier>DOI: 10.1109/DATE.2012.6176634</identifier><language>eng</language><publisher>IEEE</publisher><ispartof>2012 Design, Automation &amp; Test in Europe Conference &amp; Exhibition (DATE), 2012, p.953-958</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/6176634$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,776,780,785,786,2052,27902,54895</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/6176634$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Rajendran, J.</creatorcontrib><creatorcontrib>Pino, Y.</creatorcontrib><creatorcontrib>Sinanoglu, O.</creatorcontrib><creatorcontrib>Karri, R.</creatorcontrib><title>Logic encryption: A fault analysis perspective</title><title>2012 Design, Automation &amp; Test in Europe Conference &amp; Exhibition (DATE)</title><addtitle>DATE</addtitle><description>The globalization of Integrated Circuit (IC) design flow is making it easy for rogue elements in the supply chain to pirate ICs, overbuild ICs, and insert hardware trojans; the IC industry is losing approximately 4 billion annually [1], [2]. One way to protect the ICs from these attacks is to encrypt the design by inserting additional gates such that correct outputs are produced only when specific inputs are applied to these gates. The state-of-the-art logic encryption technique inserts gates randomly into the design [3] and does not necessarily ensure that wrong keys corrupt the outputs. Our technique ensures that wrong keys corrupt the outputs. We relate logic encryption to fault propagation analysis in IC testing and develop a fault analysis based logic encryption technique. This technique achieves 50% Hamming distance between the correct and wrong outputs (ideal case) when a wrong key is applied. Furthermore, this 50% Hamming distance target is achieved by using a smaller number of additional gates when compared to random logic encryption.</description><issn>1530-1591</issn><issn>1558-1101</issn><isbn>1457721457</isbn><isbn>9781457721458</isbn><isbn>3981080181</isbn><isbn>9783981080186</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2012</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNotj8tqwzAURNUXNEnzAaUb_4BdXUmW7u3OpOkDDN14H2RLKiquYyy3kL9vQrOZWcyZgWHsHngBwOnxuWq2heAgCg1Ga6ku2FISAkcOCJdsAWWJ-RGFK7YEVRojTnp9CiTPoSS4ZeuUvjjnAEYh4YIV9f4zdpkfuukwznE_PGVVFuxPP2d2sP0hxZSNfkqj7-b46-_YTbB98uuzr1jzsm02b3n98fq-qeo8Ep9zCYJEKYRSLlgiSY5cC55aq4OE0FpUISBIi04LMtYZpb1xiMeOdNDJFXv4n43e-904xW87HXbn2_IPuhtGYg</recordid><startdate>201203</startdate><enddate>201203</enddate><creator>Rajendran, J.</creator><creator>Pino, Y.</creator><creator>Sinanoglu, O.</creator><creator>Karri, R.</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>201203</creationdate><title>Logic encryption: A fault analysis perspective</title><author>Rajendran, J. ; Pino, Y. ; Sinanoglu, O. ; Karri, R.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i90t-3129252244dfa9939d9db1e9ba6f31fba84ff813a8d6297ad746e7d885223d1c3</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2012</creationdate><toplevel>online_resources</toplevel><creatorcontrib>Rajendran, J.</creatorcontrib><creatorcontrib>Pino, Y.</creatorcontrib><creatorcontrib>Sinanoglu, O.</creatorcontrib><creatorcontrib>Karri, R.</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Rajendran, J.</au><au>Pino, Y.</au><au>Sinanoglu, O.</au><au>Karri, R.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Logic encryption: A fault analysis perspective</atitle><btitle>2012 Design, Automation &amp; Test in Europe Conference &amp; Exhibition (DATE)</btitle><stitle>DATE</stitle><date>2012-03</date><risdate>2012</risdate><spage>953</spage><epage>958</epage><pages>953-958</pages><issn>1530-1591</issn><eissn>1558-1101</eissn><isbn>1457721457</isbn><isbn>9781457721458</isbn><eisbn>3981080181</eisbn><eisbn>9783981080186</eisbn><abstract>The globalization of Integrated Circuit (IC) design flow is making it easy for rogue elements in the supply chain to pirate ICs, overbuild ICs, and insert hardware trojans; the IC industry is losing approximately 4 billion annually [1], [2]. One way to protect the ICs from these attacks is to encrypt the design by inserting additional gates such that correct outputs are produced only when specific inputs are applied to these gates. The state-of-the-art logic encryption technique inserts gates randomly into the design [3] and does not necessarily ensure that wrong keys corrupt the outputs. Our technique ensures that wrong keys corrupt the outputs. We relate logic encryption to fault propagation analysis in IC testing and develop a fault analysis based logic encryption technique. This technique achieves 50% Hamming distance between the correct and wrong outputs (ideal case) when a wrong key is applied. Furthermore, this 50% Hamming distance target is achieved by using a smaller number of additional gates when compared to random logic encryption.</abstract><pub>IEEE</pub><doi>10.1109/DATE.2012.6176634</doi><tpages>6</tpages></addata></record>
fulltext fulltext_linktorsrc
identifier ISSN: 1530-1591
ispartof 2012 Design, Automation & Test in Europe Conference & Exhibition (DATE), 2012, p.953-958
issn 1530-1591
1558-1101
language eng
recordid cdi_ieee_primary_6176634
source IEEE Electronic Library (IEL) Conference Proceedings
title Logic encryption: A fault analysis perspective
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-12T21%3A31%3A59IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Logic%20encryption:%20A%20fault%20analysis%20perspective&rft.btitle=2012%20Design,%20Automation%20&%20Test%20in%20Europe%20Conference%20&%20Exhibition%20(DATE)&rft.au=Rajendran,%20J.&rft.date=2012-03&rft.spage=953&rft.epage=958&rft.pages=953-958&rft.issn=1530-1591&rft.eissn=1558-1101&rft.isbn=1457721457&rft.isbn_list=9781457721458&rft_id=info:doi/10.1109/DATE.2012.6176634&rft_dat=%3Cieee_6IE%3E6176634%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&rft.eisbn=3981080181&rft.eisbn_list=9783981080186&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=6176634&rfr_iscdi=true