{"title":"Baugh Wooley乘法器的新型模糊安全架构","authors":"Jyotirmoy Pathak, S. Tripathi","doi":"10.1109/ICAIA57370.2023.10169781","DOIUrl":null,"url":null,"abstract":"The internationalisation of the semiconductor supply chain brings with it an increase in the hazards posed to both data security and physical security. Theft of intellectual property through reverse engineering and harmful design alterations are two primary threats. The latter is supported, in part, by the fruitful use of reverse engineering to the design. Two of the strategies that are currently under investigation to prevent reverse engineering by end users or foundries are known as IC stealth and logic blocking. Nonetheless, for a number of years, one of the most difficult challenges has been the creation of low-overload camouflage and blocking schemes that are resilient enough to endure the ever-changing condition of heart attacks. This article describes a unique design for a disguised multiplier as well as an implementation of that architecture. The structure that has been suggested is capable of being reorganised to compute an S-bit Baugh-Wooley multiplier. To conceal obfuscation modes, a fresh control flow method has been developed and implemented. When compared to the original design, it has been demonstrated that the suggested method results in space and power needs that are significantly reduced.","PeriodicalId":196526,"journal":{"name":"2023 International Conference on Artificial Intelligence and Applications (ICAIA) Alliance Technology Conference (ATCON-1)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Novel Obfuscated Secure Architecture for Baugh Wooley Multiplier\",\"authors\":\"Jyotirmoy Pathak, S. Tripathi\",\"doi\":\"10.1109/ICAIA57370.2023.10169781\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The internationalisation of the semiconductor supply chain brings with it an increase in the hazards posed to both data security and physical security. Theft of intellectual property through reverse engineering and harmful design alterations are two primary threats. The latter is supported, in part, by the fruitful use of reverse engineering to the design. Two of the strategies that are currently under investigation to prevent reverse engineering by end users or foundries are known as IC stealth and logic blocking. Nonetheless, for a number of years, one of the most difficult challenges has been the creation of low-overload camouflage and blocking schemes that are resilient enough to endure the ever-changing condition of heart attacks. This article describes a unique design for a disguised multiplier as well as an implementation of that architecture. The structure that has been suggested is capable of being reorganised to compute an S-bit Baugh-Wooley multiplier. To conceal obfuscation modes, a fresh control flow method has been developed and implemented. When compared to the original design, it has been demonstrated that the suggested method results in space and power needs that are significantly reduced.\",\"PeriodicalId\":196526,\"journal\":{\"name\":\"2023 International Conference on Artificial Intelligence and Applications (ICAIA) Alliance Technology Conference (ATCON-1)\",\"volume\":\"69 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-04-21\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2023 International Conference on Artificial Intelligence and Applications (ICAIA) Alliance Technology Conference (ATCON-1)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICAIA57370.2023.10169781\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 International Conference on Artificial Intelligence and Applications (ICAIA) Alliance Technology Conference (ATCON-1)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICAIA57370.2023.10169781","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Novel Obfuscated Secure Architecture for Baugh Wooley Multiplier
The internationalisation of the semiconductor supply chain brings with it an increase in the hazards posed to both data security and physical security. Theft of intellectual property through reverse engineering and harmful design alterations are two primary threats. The latter is supported, in part, by the fruitful use of reverse engineering to the design. Two of the strategies that are currently under investigation to prevent reverse engineering by end users or foundries are known as IC stealth and logic blocking. Nonetheless, for a number of years, one of the most difficult challenges has been the creation of low-overload camouflage and blocking schemes that are resilient enough to endure the ever-changing condition of heart attacks. This article describes a unique design for a disguised multiplier as well as an implementation of that architecture. The structure that has been suggested is capable of being reorganised to compute an S-bit Baugh-Wooley multiplier. To conceal obfuscation modes, a fresh control flow method has been developed and implemented. When compared to the original design, it has been demonstrated that the suggested method results in space and power needs that are significantly reduced.