Circuit analysis for camouflage netlists

The importance of intellectual property (IP) in Integrated Circuit (IC) design has steadily increased over the years as the demand for semiconductor ICs increased, especially after the global COVID-19 pandemic. Electronic Design Automation (EDA) tools have also become more powerful and easily availa...

Full description

Bibliographic Details
Main Author: Liu, YuCong
Other Authors: Gwee Bah Hwee
Format: Final Year Project (FYP)
Language:English
Published: Nanyang Technological University 2021
Subjects:
Online Access:https://hdl.handle.net/10356/148797
_version_ 1811686957793673216
author Liu, YuCong
author2 Gwee Bah Hwee
author_facet Gwee Bah Hwee
Liu, YuCong
author_sort Liu, YuCong
collection NTU
description The importance of intellectual property (IP) in Integrated Circuit (IC) design has steadily increased over the years as the demand for semiconductor ICs increased, especially after the global COVID-19 pandemic. Electronic Design Automation (EDA) tools have also become more powerful and easily available, enabling newer fab-less design houses to work independently to compete directly with the bigger players in the same market. This leads to stiff competition between design companies to compete for the best designs in a lucrative market. Traditionally, reverse engineering in IC design is used for verification purposes. However, malicious parties are now enabled with power tools such as advanced imagine equipment and techniques, Artificial Intelligence (AI) algorithms, and readily available EDA software to steal the IP from their competitors. The most straight-forward algorithm (Brute-force) is not very effective for reverse engineering as the common IC chips that we use consist of billions of transistor in one package. Thus, the brute-force attack is too long, making the mentioned algorithm not economically viable for the malicious party. However, as technology improves with faster processing ICs and an improvement in the brute-force algorithm, results show that there is still potential in this method of attacking camouflage circuits. In this project, a seven-functioned standard logic cell is proposed using the “Dummy Via” hardware obfuscation method and a python Verilog simulator is made to implement an effective brute-force algorithm to attack the camouflaged cell.
first_indexed 2024-10-01T05:08:40Z
format Final Year Project (FYP)
id ntu-10356/148797
institution Nanyang Technological University
language English
last_indexed 2024-10-01T05:08:40Z
publishDate 2021
publisher Nanyang Technological University
record_format dspace
spelling ntu-10356/1487972023-07-07T18:30:28Z Circuit analysis for camouflage netlists Liu, YuCong Gwee Bah Hwee School of Electrical and Electronic Engineering HoWeng Geng ebhgwee@ntu.edu.sg Engineering::Electrical and electronic engineering The importance of intellectual property (IP) in Integrated Circuit (IC) design has steadily increased over the years as the demand for semiconductor ICs increased, especially after the global COVID-19 pandemic. Electronic Design Automation (EDA) tools have also become more powerful and easily available, enabling newer fab-less design houses to work independently to compete directly with the bigger players in the same market. This leads to stiff competition between design companies to compete for the best designs in a lucrative market. Traditionally, reverse engineering in IC design is used for verification purposes. However, malicious parties are now enabled with power tools such as advanced imagine equipment and techniques, Artificial Intelligence (AI) algorithms, and readily available EDA software to steal the IP from their competitors. The most straight-forward algorithm (Brute-force) is not very effective for reverse engineering as the common IC chips that we use consist of billions of transistor in one package. Thus, the brute-force attack is too long, making the mentioned algorithm not economically viable for the malicious party. However, as technology improves with faster processing ICs and an improvement in the brute-force algorithm, results show that there is still potential in this method of attacking camouflage circuits. In this project, a seven-functioned standard logic cell is proposed using the “Dummy Via” hardware obfuscation method and a python Verilog simulator is made to implement an effective brute-force algorithm to attack the camouflaged cell. Bachelor of Engineering (Electrical and Electronic Engineering) 2021-05-17T12:59:36Z 2021-05-17T12:59:36Z 2021 Final Year Project (FYP) Liu, Y. (2021). Circuit analysis for camouflage netlists. Final Year Project (FYP), Nanyang Technological University, Singapore. https://hdl.handle.net/10356/148797 https://hdl.handle.net/10356/148797 en A2071-201 application/pdf Nanyang Technological University
spellingShingle Engineering::Electrical and electronic engineering
Liu, YuCong
Circuit analysis for camouflage netlists
title Circuit analysis for camouflage netlists
title_full Circuit analysis for camouflage netlists
title_fullStr Circuit analysis for camouflage netlists
title_full_unstemmed Circuit analysis for camouflage netlists
title_short Circuit analysis for camouflage netlists
title_sort circuit analysis for camouflage netlists
topic Engineering::Electrical and electronic engineering
url https://hdl.handle.net/10356/148797
work_keys_str_mv AT liuyucong circuitanalysisforcamouflagenetlists