{"title":"Baugh Wooley乘法器的新型模糊安全架构","authors":"Jyotirmoy Pathak, S. Tripathi","doi":"10.1109/ICAIA57370.2023.10169781","DOIUrl":null,"url":null,"abstract":"The internationalisation of the semiconductor supply chain brings with it an increase in the hazards posed to both data security and physical security. Theft of intellectual property through reverse engineering and harmful design alterations are two primary threats. The latter is supported, in part, by the fruitful use of reverse engineering to the design. Two of the strategies that are currently under investigation to prevent reverse engineering by end users or foundries are known as IC stealth and logic blocking. Nonetheless, for a number of years, one of the most difficult challenges has been the creation of low-overload camouflage and blocking schemes that are resilient enough to endure the ever-changing condition of heart attacks. This article describes a unique design for a disguised multiplier as well as an implementation of that architecture. The structure that has been suggested is capable of being reorganised to compute an S-bit Baugh-Wooley multiplier. To conceal obfuscation modes, a fresh control flow method has been developed and implemented. When compared to the original design, it has been demonstrated that the suggested method results in space and power needs that are significantly reduced.","PeriodicalId":196526,"journal":{"name":"2023 International Conference on Artificial Intelligence and Applications (ICAIA) Alliance Technology Conference (ATCON-1)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Novel Obfuscated Secure Architecture for Baugh Wooley Multiplier\",\"authors\":\"Jyotirmoy Pathak, S. Tripathi\",\"doi\":\"10.1109/ICAIA57370.2023.10169781\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The internationalisation of the semiconductor supply chain brings with it an increase in the hazards posed to both data security and physical security. Theft of intellectual property through reverse engineering and harmful design alterations are two primary threats. The latter is supported, in part, by the fruitful use of reverse engineering to the design. Two of the strategies that are currently under investigation to prevent reverse engineering by end users or foundries are known as IC stealth and logic blocking. Nonetheless, for a number of years, one of the most difficult challenges has been the creation of low-overload camouflage and blocking schemes that are resilient enough to endure the ever-changing condition of heart attacks. This article describes a unique design for a disguised multiplier as well as an implementation of that architecture. The structure that has been suggested is capable of being reorganised to compute an S-bit Baugh-Wooley multiplier. To conceal obfuscation modes, a fresh control flow method has been developed and implemented. When compared to the original design, it has been demonstrated that the suggested method results in space and power needs that are significantly reduced.\",\"PeriodicalId\":196526,\"journal\":{\"name\":\"2023 International Conference on Artificial Intelligence and Applications (ICAIA) Alliance Technology Conference (ATCON-1)\",\"volume\":\"69 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-04-21\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2023 International Conference on Artificial Intelligence and Applications (ICAIA) Alliance Technology Conference (ATCON-1)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICAIA57370.2023.10169781\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 International Conference on Artificial Intelligence and Applications (ICAIA) Alliance Technology Conference (ATCON-1)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICAIA57370.2023.10169781","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

半导体供应链的国际化带来了数据安全和物理安全的风险增加。通过逆向工程和有害的设计变更窃取知识产权是两个主要威胁。后者在一定程度上是由逆向工程对设计的有效使用所支持的。目前正在研究的防止终端用户或代工厂进行逆向工程的两种策略是IC隐身和逻辑阻塞。尽管如此,多年来,最困难的挑战之一是创建低过载伪装和阻塞方案,这些方案具有足够的弹性,可以承受不断变化的心脏病发作情况。本文描述了变相乘法器的独特设计以及该体系结构的实现。所提出的结构能够被重新组织以计算一个s位的包-伍利乘法器。为了隐藏混淆模式,提出并实现了一种新的控制流方法。与原始设计相比,已证明所建议的方法可显着降低空间和功率需求。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Novel Obfuscated Secure Architecture for Baugh Wooley Multiplier
The internationalisation of the semiconductor supply chain brings with it an increase in the hazards posed to both data security and physical security. Theft of intellectual property through reverse engineering and harmful design alterations are two primary threats. The latter is supported, in part, by the fruitful use of reverse engineering to the design. Two of the strategies that are currently under investigation to prevent reverse engineering by end users or foundries are known as IC stealth and logic blocking. Nonetheless, for a number of years, one of the most difficult challenges has been the creation of low-overload camouflage and blocking schemes that are resilient enough to endure the ever-changing condition of heart attacks. This article describes a unique design for a disguised multiplier as well as an implementation of that architecture. The structure that has been suggested is capable of being reorganised to compute an S-bit Baugh-Wooley multiplier. To conceal obfuscation modes, a fresh control flow method has been developed and implemented. When compared to the original design, it has been demonstrated that the suggested method results in space and power needs that are significantly reduced.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
A Survey Paper on Precision Agriculture based Intelligent system for Plant Leaf Disease Identification An End to End Hybrid Learning Model for Covid-19 Detection from Chest X-ray Images A Comparison between the FOTID and FOPID Controller for the Close-Loop Speed Control of a DC Motor System Software Requirement Classification Using Machine Learning Algorithms Flood Risk Assessment Mapping of Nainital District Using GIS Tools
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1