Introduction to Hardware Obfuscation: Motivation, Methods and Evaluation. Shakya, B., Tehranipoor, M. M., Bhunia, S., & Forte, D. In Hardware Protection through Obfuscation, pages 3–32. Springer, Cham, 2017.
Introduction to Hardware Obfuscation: Motivation, Methods and Evaluation [link]Paper  doi  abstract   bibtex   
While the globalization of the semiconductor production process has accelerated innovation, lowered costs, and reduced time-to-market, it has also created grave trust issues among the different entities involved in the production process. Theft, reverse engineering, and piracy of silicon intellectual property (IP) are the realities that manufacturers and vendors of integrated circuits must face today. In order to combat these threats, obfuscation has emerged as a viable candidate for semiconductor or hardware IP protection. Obfuscation techniques aim at concealing or locking the underlying intellectual property of a semiconductor product, such as IP cores, gate-level designs, or layout, in order to prevent an untrusted party or adversary from reverse engineering and/or exploiting the design. In this chapter, we will review emerging techniques for hardware obfuscation . We will describe the semiconductor supply chain in detail and outline the specific threats associated with each stage in the supply chain. We will also introduce the field of software obfuscation and related concepts that predate hardware obfuscation. Lastly, we will introduce relevant metrics for implementing and evaluating the various hardware obfuscation techniques.
@incollection{shakya_introduction_2017,
	title = {Introduction to {Hardware} {Obfuscation}: {Motivation}, {Methods} and {Evaluation}},
	isbn = {978-3-319-49018-2 978-3-319-49019-9},
	shorttitle = {Introduction to {Hardware} {Obfuscation}},
	url = {http://link.springer.com/chapter/10.1007/978-3-319-49019-9_1},
	abstract = {While the globalization of the semiconductor production process has accelerated innovation, lowered costs, and reduced time-to-market, it has also created grave trust issues among the different entities involved in the production process. Theft, reverse engineering, and piracy of silicon intellectual property (IP) are the realities that manufacturers and vendors of integrated circuits must face today. In order to combat these threats, obfuscation has emerged as a viable candidate for semiconductor or hardware IP protection. Obfuscation techniques aim at concealing or locking the underlying intellectual property of a semiconductor product, such as IP cores, gate-level designs, or layout, in order to prevent an untrusted party or adversary from reverse engineering and/or exploiting the design. In this chapter, we will review emerging techniques for hardware obfuscation . We will describe the semiconductor supply chain in detail and outline the specific threats associated with each stage in the supply chain. We will also introduce the field of software obfuscation and related concepts that predate hardware obfuscation. Lastly, we will introduce relevant metrics for implementing and evaluating the various hardware obfuscation techniques.},
	language = {en},
	urldate = {2018-05-09},
	booktitle = {Hardware {Protection} through {Obfuscation}},
	publisher = {Springer, Cham},
	author = {Shakya, Bicky and Tehranipoor, Mark M. and Bhunia, Swarup and Forte, Domenic},
	year = {2017},
	doi = {10.1007/978-3-319-49019-9_1},
	pages = {3--32},
}

Downloads: 0