论文标题
TimingCamouflage+:具有非常规的时间安排的NetList安全增强(附录)
TimingCamouflage+: Netlist Security Enhancement with Unconventional Timing (with Appendix)
论文作者
论文摘要
随着逆向工程的最新进展,攻击者可以通过打开模具并扫描所有真实的芯片来重建网络清单以伪造筹码。通过使用标准的简单时钟方案,使所有组合块在一个时钟周期内发挥作用,从而使这种相对容易伪造的伪造成为可能,因此组合逻辑门和触发器的网络清单足以复制设计。在本文中,我们提出的假设使网络清单完全代表具有非常规时间的电路的功能无效。借助引入的波层路径,攻击者必须在反向工程过程中捕获门和互连延迟,或测试大量组合路径以识别波层途径。为了阻碍基于测试的攻击,我们用波浪前构建错误的路径,以增加伪造的挑战。实验结果证实,仅在基准电路中构建波浪的真实路径和虚假路径,仅能以微不足道的成本而成功地构建,从而挫败了潜在的攻击技术。
With recent advances in reverse engineering, attackers can reconstruct a netlist to counterfeit chips by opening the die and scanning all layers of authentic chips. This relatively easy counterfeiting is made possible by the use of the standard simple clocking scheme, where all combinational blocks function within one clock period, so that a netlist of combinational logic gates and flip-flops is sufficient to duplicate a design. In this paper, we propose to invalidate the assumption that a netlist completely represents the function of a circuit with unconventional timing. With the introduced wave-pipelining paths, attackers have to capture gate and interconnect delays during reverse engineering, or to test a huge number of combinational paths to identify the wave-pipelining paths. To hinder the test-based attack, we construct false paths with wave-pipelining to increase the counterfeiting challenge. Experimental results confirm that wave-pipelining true paths and false paths can be constructed in benchmark circuits successfully with only a negligible cost, thus thwarting the potential attack techniques.