Please use this identifier to cite or link to this item:
|Title:||Circuit analysis for camouflage netlists||Authors:||Liu, YuCong||Keywords:||Engineering::Electrical and electronic engineering||Issue Date:||2021||Publisher:||Nanyang Technological University||Source:||Liu, Y. (2021). Circuit analysis for camouflage netlists. Final Year Project (FYP), Nanyang Technological University, Singapore. https://hdl.handle.net/10356/148797||Project:||A2071-201||Abstract:||The importance of intellectual property (IP) in Integrated Circuit (IC) design has steadily increased over the years as the demand for semiconductor ICs increased, especially after the global COVID-19 pandemic. Electronic Design Automation (EDA) tools have also become more powerful and easily available, enabling newer fab-less design houses to work independently to compete directly with the bigger players in the same market. This leads to stiff competition between design companies to compete for the best designs in a lucrative market. Traditionally, reverse engineering in IC design is used for verification purposes. However, malicious parties are now enabled with power tools such as advanced imagine equipment and techniques, Artificial Intelligence (AI) algorithms, and readily available EDA software to steal the IP from their competitors. The most straight-forward algorithm (Brute-force) is not very effective for reverse engineering as the common IC chips that we use consist of billions of transistor in one package. Thus, the brute-force attack is too long, making the mentioned algorithm not economically viable for the malicious party. However, as technology improves with faster processing ICs and an improvement in the brute-force algorithm, results show that there is still potential in this method of attacking camouflage circuits. In this project, a seven-functioned standard logic cell is proposed using the “Dummy Via” hardware obfuscation method and a python Verilog simulator is made to implement an effective brute-force algorithm to attack the camouflaged cell.||URI:||https://hdl.handle.net/10356/148797||Fulltext Permission:||restricted||Fulltext Availability:||With Fulltext|
|Appears in Collections:||EEE Student Reports (FYP/IA/PA/PI)|
Updated on May 24, 2022
Updated on May 24, 2022
Items in DR-NTU are protected by copyright, with all rights reserved, unless otherwise indicated.