HARPOON: An Obfuscation-Based SoC Design Methodology for Hardware Protection
Citations
514 citations
Cites background from "HARPOON: An Obfuscation-Based SoC D..."
...Section VII concludes the paper....
[...]
...Section III details IP piracy and IC overbuilding....
[...]
489 citations
424 citations
Cites methods from "HARPOON: An Obfuscation-Based SoC D..."
...This locking is mostly done in three ways: 1) initializing ICs to a locked state on power-up [20]; 2) combinational locking by scattering xor gates randomly throughout the design [71]–[73]; and 3) adding a finitestate machine (FSM) which is initially locked and can be unlocked only with the correct sequence of primary inputs [70], [74]....
[...]
420 citations
Cites background or methods from "HARPOON: An Obfuscation-Based SoC D..."
...Hamming distancebetween the outputs of designs on applying the correct key and a randomwrong key: (a) Random insertion of XORs in ISCAS designs [6], [7], [11], (b) fault analysis-based insertion of XORs in ISCASdesigns, (c) random insertion of XORs inOpenSPARC [6], [7], [11], and (d) fault analysis-based insertion of XORs in OpenSPARC units....
[...]
...In sequential logic encryption, additional logic (black) states are introduced in the state transition graph [3], [11], [12]....
[...]
...Thus, as highlighted in [11], it becomes necessary to produce wrong outputs for many input patterns for a random, wrong key....
[...]
...9 shows the power, delay, and area overhead of the benchmarks that are encrypted with the number of key-gates listed in Table 3 using random insertion [6], [7], [11] and the proposed fault-analysis based insertion....
[...]
...Logic encryption techniques can thwart an untrusted foundry from illegally copying, reverse engineering, overproducing the IC design [3], [5]–[8], [11], and Trojan insertion [12]....
[...]
385 citations
Cites background from "HARPOON: An Obfuscation-Based SoC D..."
...In sequential logic obfuscation, additional logic (black) states are introduced in the finite state machine (FSM) of a design [23, 29]....
[...]
References
639 citations
"HARPOON: An Obfuscation-Based SoC D..." refers background in this paper
...1(a) against an ordinary two-input AND gate will report four possible input vectors with en = 1 as failing patterns....
[...]
220 citations
"HARPOON: An Obfuscation-Based SoC D..." refers background or methods in this paper
...Previous work on IP protection can be broadly classified into two main categories: 1) obfuscationbased protection and 2) authentication-based protection....
[...]
...…trying to determine the functionality of an obfuscated gate-level IP core can take resort to either of the following ways: 1) simulation-based reverse engineering to determine functionality of the design or 2) structural analysis of the netlist to identify and isolate the original design from the…...
[...]
194 citations
143 citations
[...]
138 citations
"HARPOON: An Obfuscation-Based SoC D..." refers background in this paper
...Previous work on IP protection can be broadly classified into two main categories: 1) obfuscationbased protection and 2) authentication-based protection....
[...]