• Skip to main content
  • Skip to header right navigation
  • Skip to site footer
MEST Center

MEST Center

National Microelectronic Security Training Center

  • Home
  • About Us
    • Highlights
    • Advisory Board
    • Diversity and Inclusion Statement
    • Careers
  • Contributors
  • Trainings & Schedule
    • Join us on nanoHUB!
    • Webinars
    • On-Site and Virtual Training
    • On-Campus Training
    • Certificate Programs
      • Micro Certificates
      • Macro Certificates
    • Courses
    • Modules
  • Contact Us

Auburn University

November 17, 2023 by Limor Herb
Phase 3, year 1 | Phase 3, year 2 |

Training Modules for Preventing IP Piracy

Due to the outsourced IC design and fabrication, the underlying hardware in various information systems that were once trusted can no longer be so. The untrusted chip fabrication and test facilities represent security threats to the current horizontal integration. One of the security threats posed by these entities is piracy of intellectual properties (IPs), where an entity in the supply chain can use, modify and/or sell functional IPs illegally as the untrusted foundry has access to all the mask information constructed from the GDSII or OASIS files and then reconstructs all the layers and the complete netlist with advanced tools. In addition, reverse engineering (RE) of ICs using state-of-the-art decapsulation tools and imaging can be exploited by an adversary to reconstruct the gate-level netlist from a chip.
Logic locking or obfuscation is a promising design-for-security solution to counter IP piracy, where chips are obfuscated with secret keys. The original circuit functionality is restored only when the correct key is programmed. Attackers cannot decode the original functionality even after extracting the netlist from RE. Logic locking promises to hide the inner details of a circuit by inserting a set of key gates. The key needs to be kept secret, and care must be taken during the design process so that this secret key is not leaked to the primary output directly during normal operation. However, the Boolean satisfiability-based attack (SAT attack) has effectively determined the secret key value and rendered initial locking schemes ineffective. Note, SAT-based attack is still the backbone for the oracle-guided attacks against post-SAT solutions.

Phase 3, year 1

Modules

IDLab ModuleMain Tools/EquipmentPlatformsDue DateReceived
M24Different locking schemes for preventing IP Piracy Synopsys Design Compiler, Synopsys TetraMAX, Synopsys 32nm SAED32 Library 11/30/202311/30/23
M25Basics of Boolean Satisfiability Analysis MiniSat, a minimalistic, open-source, and high-performance Boolean satisfiability (SAT) solver 12/29/202301/03/24
M26Understanding SAT Attack Understanding SAT Attack 1/31/202403/01/24
M27SAT Attack Analysis SAT Attack Complexity Analysis 5/1/202405/03/24
Phase 3, year 2

Modules

IDLab ModuleMain Tools/EquipmentPlatformsDue DateReceived
M70SAT Attack-based Simple Test Pattern Generation Approach  10/15/202410/14/2024
M71SAT Attack-based Complex Test Pattern Generation and Identification of Redundant Faults  11/15/202411/20/2024
 
Category: Phase 3

Stay in touch!

Join our LISTSERV

Join us on nanoHUB

  • LinkedIn
  • Email MEST Center
  • Join us on nanoHUB!