Please use this identifier to cite or link to this item: https://hdl.handle.net/10356/148797
Title: Circuit analysis for camouflage netlists
Authors: Liu, YuCong
Keywords: Engineering::Electrical and electronic engineering
Issue Date: 2021
Publisher: Nanyang Technological University
Source: Liu, Y. (2021). Circuit analysis for camouflage netlists. Final Year Project (FYP), Nanyang Technological University, Singapore. https://hdl.handle.net/10356/148797
Project: A2071-201
Abstract: The importance of intellectual property (IP) in Integrated Circuit (IC) design has steadily increased over the years as the demand for semiconductor ICs increased, especially after the global COVID-19 pandemic. Electronic Design Automation (EDA) tools have also become more powerful and easily available, enabling newer fab-less design houses to work independently to compete directly with the bigger players in the same market. This leads to stiff competition between design companies to compete for the best designs in a lucrative market. Traditionally, reverse engineering in IC design is used for verification purposes. However, malicious parties are now enabled with power tools such as advanced imagine equipment and techniques, Artificial Intelligence (AI) algorithms, and readily available EDA software to steal the IP from their competitors. The most straight-forward algorithm (Brute-force) is not very effective for reverse engineering as the common IC chips that we use consist of billions of transistor in one package. Thus, the brute-force attack is too long, making the mentioned algorithm not economically viable for the malicious party. However, as technology improves with faster processing ICs and an improvement in the brute-force algorithm, results show that there is still potential in this method of attacking camouflage circuits. In this project, a seven-functioned standard logic cell is proposed using the “Dummy Via” hardware obfuscation method and a python Verilog simulator is made to implement an effective brute-force algorithm to attack the camouflaged cell.
URI: https://hdl.handle.net/10356/148797
Fulltext Permission: restricted
Fulltext Availability: With Fulltext
Appears in Collections:EEE Student Reports (FYP/IA/PA/PI)

Files in This Item:
File Description SizeFormat 
[A2071-201] FYP Final Report_Liu YuCong (1).pdf
  Restricted Access
8.68 MBAdobe PDFView/Open

Page view(s)

117
Updated on May 24, 2022

Download(s)

7
Updated on May 24, 2022

Google ScholarTM

Check

Items in DR-NTU are protected by copyright, with all rights reserved, unless otherwise indicated.