Automatic netlist scrambling methodology in ASIC design flow to hinder the reverse engineering

Reverse engineering is a great peril for hardware security especially when functional behavior extraction of the circuit is needed. In this paper a novel method is presented to obfuscate the wiring topology of the design for hindering or even preventing the reverse engineering. In the proposed methodology, new standard cells (Wire Scrambling cells) are presented and then, a physical design methodology is proposed in which wiring topology of the circuit is scrambled automatically using the suggested wire scrambling cells. Experimental results show that reverse engineering can be hindered or even practically protected in cost of negligible overheads in area, power consumption and total wire length.

[1]  Xuefei Leng,et al.  Smart card applications and security , 2009, Inf. Secur. Tech. Rep..

[2]  Helena Handschuh,et al.  Fast Primitives for Internal Data Scrambling in Tamper Resistant Hardware , 2001, CHES.

[3]  Swarup Bhunia,et al.  Hardware protection and authentication through netlist level obfuscation , 2008, ICCAD 2008.

[4]  Joseph Zambreno,et al.  Preventing IC Piracy Using Reconfigurable Logic Barriers , 2010, IEEE Design & Test of Computers.

[5]  Rudy Lauwereins,et al.  Design, Automation, and Test in Europe , 2008 .

[6]  Swarup Bhunia,et al.  On-demand transparency for improving hardware Trojan detectability , 2008, 2008 IEEE International Workshop on Hardware-Oriented Security and Trust.

[7]  Swarup Bhunia,et al.  Security Against Hardware Trojan Attacks Using Key-Based Design Obfuscation , 2011, J. Electron. Test..

[8]  Miodrag Potkonjak,et al.  Remote activation of ICs for piracy prevention and digital right management , 2007, 2007 IEEE/ACM International Conference on Computer-Aided Design.

[9]  Jarrod A. Roy,et al.  Protecting bus-based hardware IP by secret sharing , 2008, 2008 45th ACM/IEEE Design Automation Conference.