Inverter-based MUX: A Low Overhead Approach for Logic Encryption
Mr. Ghobad Zarrinchian, , , ,
Affiliations 1*Dept. of Computer Engineering, Islamic Azad University of Yadegar-e-Imam Khomeini (rah) Shahr-e-Rey, Tehran, Iran
IC overproduction and design theft have been a concern in recent decades for the revenue loss of digital design companies. Logic encryption is a well-known approach to address this problem by locking the functionality of digital designs. In logic encryption techniques, key-gates are added to the design whose functionality is to lock (or obfuscate) the operation of the circuit. Correct functionality is achieved by applying a correct key, which is only known to the IC designer, to these key-gates. The key-gates, however, may incur a considerable overhead to the area and performance of the design. In this paper, a new technique based on simple inverter cells is proposed, which can provide the required locking functionality with low overhead. The results on a set of ISCAS’89 benchmarks reveal that the proposed approach incurs about 2% to 19% area overhead, which is less than any other technique, as well as low power overhead.
Mr. Ghobad Zarrinchian."Inverter-based MUX: A Low Overhead Approach for Logic Encryption". International Journal of Computer Engineering In Research Trends (IJCERT) ,ISSN:2349-7084, Vol.7, Issue 07,pp.30-35, July- 2020, URL:http://ijcert.org/ems/ijcert_papers/V7I706.pdf,
 U. Guin, D. DiMase, M. Tehranipoor, “Counterfeit Integrated Circuits: Detection, Avoidance, and the Challenges Ahead,” Journal of Electronic Testing, Vol. 30, Issue 1, pp. 9-23, 2014.
 S. Bhunia, M.S. Hsiao, M. Banga, S. Narasimhan, “Hardware Trojan Attacks: Threat Analysis and Countermeasures,” In Proc. IEEE, Vol. 102, Issue 8, 2014.
 Y. Alkabani, F. Koushanfar, M. Potkonjak, “Remote Activation of ICs for Piracy Prevention and Digital Right Management,” In Proc. ICCAD, pp. 674-677, 2007.
 F. Koushanfar, “Provably Secure Active IC Metering Techniques for Piracy Avoidance and Digital Rights Management,” IEEE Transactions on Information Forensics and Security, Vol. 7. Issue 1, pp. 51-63, 2012.
 J.A. Roy, F. Koushanfar, I.L. Markov, “EPIC: Ending Piracy of Integrated Circuits,” In Proc. DATE, pp. 1069-1074, 2008.
 J. Rajendran, H. Zhang, C. Zhang, G.S. Rose, Y. Pino, O. Sinanoglu, R. Karri, “Fault Analysis-based Logic Encryption,” IEEE Transactions on Computers, Vol. 64, Issue 2, pp. 410-424, 2013.
 J.A. Roy, F. Koushanfar, I.L. Markov, “Protecting Bus-based Hardware IP by Secret Sharing,” In Proc. DAC, pp. 846-851, 2008.
 S. Zamanzadeh, A. Jahanian, “Automatic Netlist Scrambling Methodology in ASIC Design Flow to Hinder the Reverse Engineering,” In Proc. VLSI-SoC, pp. 52-53, 2013.
 J. Zhang, “A Practical Logic Obfuscation Technique for Hardware Security,” IEEE Transactions on VLSI, Vol. 24, Issue 3, pp. 1193-1197, 2016.
 A. Baumgarten, A. Tyagi, J. Zambreno, “Preventing IC Piracy Using Reconfigurable Logic Barriers,” IEEE Design & Test of Computers, Vol. 27, Issue 1, pp. 66-75, 2010.
 K. Juretues, I. Savidis, “Reduced Overhead Gate Level Logic Encryption,” In Proc. GLSVLSI, 2016.
 A. Morgenshtein, A. Fish, I.A. Wagner, “Gate-Diffusion Input (GDI): A Power-Efficient Method for Digital Combinatorial Circuits,” IEEE Transactions on Very Large Scale Integration (VLSI) Systems, Vol. 10, No. 5, 2002.
 Predictive Technology Model (PTM), Available online at: http://ptm.asu.edu.
We have kept IJCERT is a free peer-reviewed scientific journal to endorse conservation. We have not put up a paywall to readers, and we do not charge for publishing. But running a monthly journal costs is a lot. While we do have some associates, we still need support to keep the journal flourishing. If our readers help fund it, our future will be more secure.