©2020 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.
SANSCrypt: A Sporadic-Authentication-Based Sequential Logic Encryption Scheme
††thanks: Identify applicable funding agency here. If none, delete this.
Abstract
We propose SANSCrypt, a novel sequential logic encryption scheme to protect integrated circuits against reverse engineering. Previous sequential encryption methods focus on modifying the circuit state machine such that the correct functionality can be accessed by applying the correct key sequence only once. Considering the risk associated with one-time authentication, SANSCrypt adopts a new temporal dimension to logic encryption, by requiring the user to sporadically perform multiple authentications according to a protocol based on pseudo-random number generation. Analysis and validation results on a set of benchmark circuits show that SANSCrypt offers a substantial output corruptibility if the key sequences are applied incorrectly. Moreover, it exhibits an exponential resilience to existing attacks, including SAT-based attacks, while maintaining a reasonably low overhead.
I Introduction
The design process of modern VLSI systems often relies on a supply chain where several services, such as verification, fabrication, and testing, are outsourced to third-party companies. If these companies gain access to a sufficient amount of critical design information, they can potentially reverse engineer the design. One possible consequence of reverse engineering is Hardware Trojan (HT) insertion, which can be destructive for many applications. HTs can either disrupt the normal circuit operation [1] or provide the attacker with access to critical data or software running on the chip [2].
Countermeasures such as logic encryption [3, 4, 5, 6], integrated circuit (IC) camouflaging [7], watermarking [8], and split manufacturing [9] have been developed over the past decades to prevent IC reverse engineering. Among these, logic encryption has received significant attention as a promising, low-overhead countermeasure. Logic encryption modifies the circuit in a way such that a user can only access the correct circuit functionality after providing a correct key sequence. Otherwise, the circuit function remains hidden, and the output different from the correct one.
Various logic encryption techniques [3, 4, 5, 6] and potential attacks [10, 11, 12] have appeared in the literature, as well as methods to systematically evaluate them [13, 14]. A category of techniques [3, 4, 5] is designed to modify and protect the combinational logic portions of the chip and can be extended to sequential circuits by assuming that the scan chains are not accessible by the attacker, e.g., due to scan chain encryption and obfuscation [15, 16, 17]. Another category of techniques, namely, sequential logic encryption [6, 18, 19], targets, instead, the state transitions of the original finite state machine (FSM). Sequential logic encryption introduces additional states and transitions in the original FSM, essentially partitioning the state space into two sets. After being powered on or reset, the FSM enters the encrypted mode, exhibiting an incorrect output behavior. The FSM transitions, instead, to the functional mode, providing the correct functionality, upon receiving a sequence of key patterns.
A set of attacks have been reported against sequential encryption schemes, aiming to retrieve the correct key sequence or circuit function. Shamsi et al. [20] adapted the Boolean satisfiability (SAT)-based attack [10], traditionally targeted to combinational logic encryption, by leveraging methods from bounded model checking to unroll the sequential circuit. Recently, an attack based on automatic test pattern generation (ATPG) [21] uses concepts from excitation and propagation of stuck-at faults to search the key sequence among the input vectors generated by ATPG. When the attackers have some knowledge of the topology of the encrypted FSM, then they can extract and analyze the state transition graph and bypass the encrypted mode [22]. Overall, the continuous advances in FSM extraction and analysis tools tend to challenge any of the existing sequential encryption schemes and call for approaches that can significantly increase their robustness.
This paper proposes SANSCrypt, a Sporadic-Authentication-based Sequential Logic Encryption (SANSCrypt) scheme, which raises the attack difficulty via a multiple-authentication protocol, whose decryption relies on retrieving a set of key sequences as well as the time at which the sequences should be applied. Our contributions can be summarized as follows:
-
•
A robust, multi-authentication based sequential logic encryption method that for the first time, to the best of our knowledge, systematically incorporates the robustness of multi-factor authentication (MFA) [23] in the context of hardware obfuscation.
-
•
An architecture for sporadic re-authentication where key sequences must be applied at multiple random times, determined by a random number generator, to access the correct circuit functionality.
-
•
Security analysis and empirical validation of SANSCrypt on a set of ISCAS’89 benchmark circuits [24], showing exponential resilience against existing attacks, including sequential SAT-based attacks, and reasonably low overhead.
Analysis and validation results show that SANSCrypt can significantly enhance the resilience of sequential logic encryption under different attack assumptions.
II Background and Related Work
Among the existing sequential logic encryption techniques, HARPOON [6] defines two modes of operation. When powered on, the circuit is in the encrypted mode and exhibits an incorrect functionality. The user must apply a sequence of input patterns during the first few clock cycles to enter the functional mode, in which the correct functionality is recovered. However, the encrypted mode and functional mode FSMs are connected by only one transition (edge), which can be exploited by an attacker to perform FSM extraction and analysis, and bypass the encrypted mode [22].
Interlocking [18] sequential encryption modifies the circuit FSM such that multiple paths are available between the states of the encrypted and the ones of the functional FSMs, making it harder for the attacker to detect the only correct transition between the two modes. However, in both HARPOON and Interlocking encryption, once the circuit enters the functional mode, it remains there until reset.
Dynamic State-Deflection [25] requires, instead, an additional key input verification step while in the functional mode. If the additional key input is incorrect, the FSM transitions to a black-hole state cluster which can no longer be left. However, because the additional key input is fixed over time, the scheme becomes more vulnerable to sequential SAT-based attacks [20].
Finally, instead of corrupting the circuit function immediately after reset, DESENC [19] counts the occurrence of a specific but rare event in the circuit. Once the counter reaches a threshold, the circuit enters the encryption mode. This scheme is more resilient to sequential SAT-based attacks [26] because it requires unrolling the circuit FSM a large number of times to find the key. However, the initial transparency window may still expose critical portions of the circuit functionality.
III SANSCrypt
We introduce design and implementation details for SANSCrypt, starting with the underlying threat model.
III-A Threat Model
SANSCrypt assumes a threat model that is consistent with the previous literature on sequential logic encryption [6, 20, 22]. The goal of the attack is to access the correct circuit functionality, by either reconstructing the deobfuscated circuit or finding the correct key sequence. To achieve this goal, the attacker can leverage one or more of the following resources: (i) the encrypted netlist; (ii) a working circuit providing correct input-output pairs; (iii) knowledge of the encryption technique. In addition, we assume that the attacker has no access to the scan chain and cannot directly observe or change the state of the circuit.
III-B Authentication Protocol
As shown in Fig. 1a, existing logic encryption techniques are mostly based on a single-authentication protocol, requiring users to be authenticated only once before using the correct circuit function. After authentication, the circuit remains functional unless it is powered off or reset. To attack the circuit, it is then sufficient to discover the correct key sequence that must be applied in the initial state.


We adopt, instead, the authentication protocol in Fig. 1b, where the functional circuit can “jump” back to the encrypted mode from the functional mode. Once the back-jumping occurs, another round of authentication is required to resume the normal operation. The back-jumping can be triggered multiple times and involve a different key sequence for each re-authentication step. The hardness of attacking this protocol stems from both the increased number of the key sequences to be produced and the uncertainty on the time at which each sequence should be applied. A new temporal dimension adds to the decryption procedure, which poses a significantly higher threshold to the attackers.
III-C Overview of the Encryption Scheme
SANSCrypt is a sequential logic encryption scheme which supports random back-jumping, as represented in Fig. 2. When the circuit is powered or reset, the circuit falls into the reset state of the encrypted mode. To transition to the initial (or reset) state of the functional mode, the user must apply at startup the correct key sequence to the primary input ports.
Once in the functional mode, the circuit can deliberately, but randomly, jump back, as denoted by the blue edges in Fig. 2, to a state in the encrypted mode, called back-jumping state, after a designated number of clock cycles , called back-jumping period. The user needs to apply another key sequence to resume normal operations, as shown by the red arrows. Both the back-jumping state and the back-jumping period are determined by a pseudo-random number generator (PRNG) embedded in the circuit. Therefore, when and where the back-jumping operation happens is unpredictable unless the attacker is able to break the PRNG or find its seed. The schematic of SANSCrypt is shown in Fig. 3 and consists of two additional blocks, a back-jumping module and an encryption finite state machine (ENC-FSM), besides the original circuit. We discuss each of these blocks in the following subsections.
III-D Back-Jumping Module
The back-jumping module consists of an -bit PRNG, an -bit Counter, and a Back-Jumping Finite State Machine (BJ-FSM) which sends back-jumping commands to the rest of the circuit. As summarized in the flowchart in Fig. 4, when the circuit is in the encrypted mode, BJ-FSM checks whether the authentication has occurred. If this is the case, BJ-FSM stores the current PRNG output as the back-jumping period and initializes the counter.
The counter increments its output at each clock cycle until it reaches . This event triggers BJ-FSM to sample again the current PRNG output , which is generally different from , and use it to determine the back-jumping state . For example, if is an -bit binary number, BJ-FSM can arbitrarily select bits from and assign the value to . If the first bits of are selected, we have . At the same time, BJ-FSM sends a back-jumping request to the other blocks of the circuit and returns to its initial state, where it keeps checking the authentication status of the circuit. On receiving the back-jumping request, the circuit jumps back to state in the encrypted mode and will stay there unless re-authentication is performed. Any PRNG architecture can be selected in this scheme, based on the design budget and the desired security level. For example, linear PRNGs, such as Linear Feedback Shift Registers (LFSRs), provide higher speed and lower area overhead but tend to be more vulnerable than cipher algorithm-based PRNGs, such as AES, which are, however, more expensive.
III-E Encryption Finite State Machine (ENC-FSM)
The Encryption Finite State Machine (ENC-FSM) determines whether the user’s key sequence is correct and, if it is not correct, takes actions to hide the functionality of the original circuit. The input of the ENC-FSM can be provided via the primary input ports, without the need to create extra input ports for authentication. The output of ENC-FSM, which is bit long, together with a set of nodes in the original circuit netlist, can be provided as an input to a set of XOR gates, to corrupt the circuit function as in combinational logic encryption [3]. For example, in Fig. 5, a 3-bit array is connected to six nodes in the original circuit via XOR gates. In this paper, XOR gates are inserted at randomly selected nodes. However, any other combinational logic encryption technique is also applicable. As a design parameter, we denote by node coverage the ratio between the number of inserted XOR gates and the total number of combinational logic gates in the circuit.
Only one state of ENC-FSM, termed , is used in the functional mode. In state , all bits in are set to zero and the original circuit functionality is activated. In the other states, the value of changes based on the state, but at least one of its bits is set to one to guarantee that the final output is incorrect. A sample truth table for a 3-bit array is shown in Table I. Even if the circuit is in the encrypted mode, changes its value based on the state of the encryption FSM. Such an approach makes it difficult for signal analysis attacks, aiming to locate signals with low switching activity in the encrypted mode, to find and bypass ENC-FSM. After a valid authentication, the circuit resumes its normal operation. Additional registers are, therefore, required in the ENC-FSM to store the circuit state before back-jumping so that it can be resumed after authentication.
State | E0 | E1 | E2 | E3 | E4 | Auth |
---|---|---|---|---|---|---|
0 | 1 | 1 | 1 | 1 | 0 | |
1 | 0 | 1 | 1 | 0 | 0 | |
1 | 1 | 1 | 0 | 0 | 0 |
IV Performance Analysis
We analyze SANSCrypt’s resilience against existing attacks and estimate its overhead.
IV-A Brute-Force Attack
Let us suppose that the number of primary input bits used as key inputs is and each re-authentication procedure requires clock cycles to apply the key sequence. If the attacker has no preference in selecting the key sequence, then she would have, on average, attempts for each re-authentication procedure, which amounts to the same brute-force attack complexity of HARPOON. However, because the correct key sequence of each re-authentication procedure depends on the PRNG output, the number of possible values of the PRNG output will also contribute to the attack effort. If each PRNG output corresponds to a unique key sequence which is independent from other key sequences, the average attack effort will be . For a 10-bit PRNG, , and , the average attack effort will reach .
IV-B Sequential SAT-Based Attack
A SAT-based attack can be carried out on sequential encryption by unrolling the sequential portions of the circuit [20]. This attack can be remarkably successful especially when the correct key is the same at each time (clock cycle) and the key input ports are different from the primary input ports. Similarly to HARPOON, SANSCrypt is resilient to this SAT-based attack variant, since the correct keys are generally not the same at different clock cycles.
We therefore analyze the resilience of SANSCrypt via a modified version of the sequential SAT-based attack [22] that is appropriate for schemes such as HARPOON and SANSCrypt, as shown in Fig. 6. Let us first assume that the encryption scheme requires clock cycles after reset to enter the functional mode. Then, the attacker can start the attack by unrolling the circuit times. The first copies of the circuit receive the keys at their primary input ports ( and ), while the primary input and output ports of the circuit replica can be used to read the circuit input and output signals after cycles. If the SAT-based attack fails to find the correct key with circuit replicas, as in Fig. 6, the circuit will be unrolled one more time (see, e.g., [20]).
The attack above would be still ineffective on SANSCrypt, since it can retrieve the first key sequence but would fail to discover when the next back-jumping occurs and what would be the next key sequence. Even if the attacker knows when the next back-jumping occurs, the above SAT-based attack will fail due to the large number of circuit replicas needed to find all the key sequences, as empirically observed in Section V.
IV-C FSM Extraction and Structural Analysis
As discussed in Section II, a possible shortcoming of certain sequential encryption schemes is the clear boundary between the encrypted mode and the functional mode FSMs. As shown in Fig. 3, SANSCrypt addresses this issue by designing more than one transition between the two FSMs.
An attacker may also try to locate and isolate the output of ENC-FSM by looking for low signal switching activities when the circuit is in the encrypted mode. SANSCrypt addresses this risk by expanding the output of ENC-FSM from one bit to an array. The value of each bit changes frequently based on the state of the encrypted mode FSM, which makes it difficult for attackers to find the output of ENC-FSM based on signal switching activities.
IV-D Cycle Delay Analysis
Due to multiple back-jumping and authentication operations in SANSCrypt, additional clock cycles will be required in which no other operation can be executed. Suppose that authentication requires clock cycles and the circuit stays in the functional mode for clock cycles before the next back-jumping occurs, as shown in Fig. 7.
The cycle delay overhead can be computed as the ratio .
Specifically, for an -bit PRNG, the average is equal to the average output value, i.e., . To illustrate how the cycle delay overhead is influenced by this encryption, Fig. 8 shows the relation between average cycle delay overhead and PRNG bit length. The clock cycles () required for (re-)authentication are set as 8, 16, 64, and 128.
When the PRNG bit length is small, the average cycle delay increases significantly with the increase of . However, the cycle delay can be reduced by increasing the PRNG bit length. For example, the average cycle delay overhead becomes negligible for all the four cases when the PRNG bit length is 11 or larger. A key manager, available to the trusted user, will be in charge of automatically applying the key sequences from a tamper-proof memory at the right time, as computed from a hard-coded replica of the PRNG.




Circuit | s27 | s298 | s1238 | s9234 | ||||||||||||
Node Coverage | 5% | 10% | 15% | 20% | 5% | 10% | 15% | 20% | 5% | 10% | 15% | 20% | 5% | 10% | 15% | 20% |
Area [%] | 1418.5 | 1418.5 | 1403.2 | 1403.2 | 413.0 | 427.3 | 425.2 | 453.8 | 144.8 | 165.7 | 176.0 | 189.2 | 114.6 | 131.7 | 144.5 | 160.1 |
Power [%] | 1627.7 | 1627.7 | 1627.5 | 1627.5 | 385.7 | 390.6 | 389.9 | 402.8 | 217.8 | 232.1 | 235.0 | 249.8 | 179.8 | 197.5 | 188.0 | 190.6 |
Delay [%] | 0.0 | 0.0 | 1.4 | 1.4 | 0.0 | 0.0 | 0.0 | 0.5 | 0.0 | 0.0 | 0.0 | 5.8 | 0.0 | 0.0 | 0.9 | 3.6 |
Circuit | s15850 | s35932 | s38584 | Average (s27 and s298 excluded) | ||||||||||||
Node Coverage | 5% | 10% | 15% | 20% | 5% | 10% | 15% | 20% | 5% | 10% | 15% | 20% | 5% | 10% | 15% | 20% |
Area [%] | 92.9 | 112.1 | 120.1 | 133.9 | 116.3 | 129.5 | 139.4 | 151.6 | 133.5 | 140.9 | 158.7 | 165.6 | 120.4 | 136.0 | 147.8 | 160.1 |
Power [%] | 127.4 | 142.3 | 153.2 | 163.0 | 98.4 | 101.9 | 101.2 | 103.0 | 123.9 | 128.8 | 142.0 | 140.3 | 149.5 | 160.5 | 163.9 | 169.4 |
Delay [%] | -0.3 | 0.0 | 0.1 | 0.6 | -0.4 | 0.0 | 4.3 | 5.3 | 0.6 | 2.0 | 0.4 | 4.9 | 0.0 | 0.4 | 1.1 | 4.0 |
V Simulation Results
We first evaluate the effectiveness of SANSCrypt on seven ISCAS’89 sequential benchmark circuits with different sizes, as summarized in Table III. All the experiments are executed on a Linux server with 48 -GHz processor cores and 500-GB memory. We implement our technique on the selected circuits with different configurations and use a 45-nm NangateOpenCellLibrary [27] to synthesize the encrypted netlists for area optimization under a critical-path delay constraint that targets the same performance as in the non-encrypted versions.
Circuit | s27 | s298 | s1238 | s9234 | s15850 | s35932 | s38584 |
---|---|---|---|---|---|---|---|
Input | 4 | 3 | 14 | 36 | 77 | 35 | 38 |
Output | 1 | 6 | 14 | 39 | 150 | 320 | 304 |
DFF | 3 | 14 | 18 | 211 | 534 | 1728 | 1426 |
Gate | 10 | 119 | 508 | 5597 | 9772 | 16065 | 19253 |
For the purpose of illustration, we realize the PRNG using Linear Feedback Shift Registers (LFSR) with different sizes, ranging from 5 to 15 bits. An LFSR provides an area-efficient implementation and has often been used in other logic encryption schemes in the literature [28, 9]. We choose a random 8-cycle-long key sequence as the correct key, and select , , , and as node coverage levels. Finally, we use the Hamming distance (HD) between the correct and the corrupted output values as a metric for the output corruptibility. If the HD is 0.5, the effort spent to identify the incorrect bits is maximum.
We run functional simulations on all the encrypted circuits with the correct key sequences (case 1) and without the correct sequences (case 2), by applying 1000 random input vectors. We then compare the circuit output with the golden output from the original netlist and calculate the HD between the two. Moreover, we demonstrate the additional robustness of SANSCrypt by simulating a scenario (case 3) in which the attacker assumes that the encryption is based on a single-authentication protocol and provides only the first correct key sequence upon reset. Fig. 9a-d show the average HD in these three cases. For all the circuits, the average HD is zero only in case 1, when all the correct key sequences are applied at the right clock cycles. Otherwise, in case 2 (orange) and case 3 (green), we observe a significant increase in the average HD. The average HD in case 3 is always smaller than that of case 2 because, in case 3, the correct functionality is recovered for a short period of time, after which the circuit jumps back to the encrypted mode. The longer the overall runtime, the smaller will be the impact of the transparency window in which the circuit exhibits the correct functionality.
We then apply the sequential SAT-based attack in Section IV to circuit s1238 with 5-bit LFSR and 20% node coverage, under a stronger attack model, in which the attacker knows when to apply the correct key sequences. Table IV shows the runtime to find the first set of 7 key sequences.
Key Seq. Index | 1 (HARPOON) | 2 | 3 | 4 | 5 | 6 | 7 |
---|---|---|---|---|---|---|---|
Runtime [s] | 4 | 123 | 229 | 1941 | 1301 | 2202 | 25571 |
The runtime remains exponential in the number of key sequences, which makes sequential SAT-based attacks impractical for large designs.
Finally, Table II reports the synthesized area, power, and delay overhead due to the implementation of our technique. In more than of the circuits the delay overhead is less than , and exceeds the required clock cycle by at most . Except for s27 and s298, characterized by a small gate count, all the other circuits show average area and power overhead of and , respectively, which is expected due to the additional number of registers required in ENC-FSM to guarantee that the correct state is entered upon re-authentication. However, because critical modules in large SoCs may only account for a small portion of the area, this overhead becomes affordable under partial obfuscation. For example, we encrypted a portion of state registers in s38584, the largest ISCAS’89 benchmark, using SANSCrypt. We then randomly inserted additional XOR gates to achieve the same HD as in the case of full encryption. Table V reports the overhead results after synthesis, when the ratio between the encrypted state registers and the total number of state registers decreases from to .
Encrypted registers/Total registers | 100% | 50% | 25% | 10% | 5% | 2.5% | 1% |
Area [%] | 133.5 | 71.6 | 49.1 | 33.4 | 27.8 | 23.5 | 22.4 |
Power [%] | 123.9 | 40.2 | 9.6 | -12.8 | -20.5 | -22.1 | -25.0 |
Delay [%] | 0.6 | 1.8 | 2.1 | 4.2 | 5.4 | 3.9 | 4.6 |
Encrypting of the registers will only cost of the area while incurring negative power overhead and delay overhead.
VI Conclusion
We proposed SANSCrypt, a robust sequential logic encryption technique relying on a sporadic authentication protocol, in which re-authentications are carried out at pseudo-randomly selected time slots to significantly increase the attack effort. Future work includes optimizing the implementation to further reduce the overhead and hide any structural traces that may expose the correct key sequence. Further, we plan to investigate key manager architectures to guarantee reliable timing and operation in real-time applications.
Acknowledgment
This work was partially sponsored by the Air Force Research Laboratory (AFRL) and the Defense Advanced Research Projects Agency (DARPA) under agreement number FA8560-18-1-7817.
References
- [1] R. Karri, J. Rajendran, K. Rosenfeld, and M. Tehranipoor, “Trustworthy hardware: Identifying and classifying hardware trojans,” Computer, vol. 43, no. 10, pp. 39–46, 2010.
- [2] M. Tehranipoor and F. Koushanfar, “A survey of hardware trojan taxonomy and detection,” IEEE Design & Test of Computers, vol. 27, no. 1, pp. 10–25, 2010.
- [3] J. Rajendran, H. Zhang, C. Zhang, G. S. Rose, Y. Pino, O. Sinanoglu, and R. Karri, “Fault analysis-based logic encryption,” IEEE Trans. Computers, vol. 64, no. 2, pp. 410–424, 2013.
- [4] M. Yasin, A. Sengupta, M. T. Nabeel, M. Ashraf, J. J. Rajendran, and O. Sinanoglu, “Provably-secure logic locking: From theory to practice,” in Proc. SIGSAC Conf. Computer and Communications Security, pp. 1601–1618, 2017.
- [5] M. Yasin, B. Mazumdar, J. J. Rajendran, and O. Sinanoglu, “SARLock: SAT attack resistant logic locking,” in IEEE Int. Symp. Hardware Oriented Security and Trust (HOST), pp. 236–241, 2016.
- [6] R. S. Chakraborty and S. Bhunia, “HARPOON: an obfuscation-based SoC design methodology for hardware protection,” IEEE Trans. Computer-Aided Design of Integrated Circuits and Systems, vol. 28, no. 10, pp. 1493–1502, 2009.
- [7] M. Yasin, B. Mazumdar, O. Sinanoglu, and J. Rajendran, “CamoPerturb: Secure IC camouflaging for minterm protection,” in 2016 IEEE/ACM Int. Conf. Computer-Aided Design (ICCAD), pp. 1–8, 2016.
- [8] E. Charbon, “Hierarchical watermarking in IC design,” in IEEE Proc. Custom Integrated Circuits Conf., pp. 295–298, 1998.
- [9] K. Xiao, D. Forte, and M. M. Tehranipoor, “Efficient and secure split manufacturing via obfuscated built-in self-authentication,” in IEEE Int. Symp. Hardware Oriented Security and Trust (HOST), pp. 14–19, 2015.
- [10] P. Subramanyan, S. Ray, and S. Malik, “Evaluating the security of logic encryption algorithms,” in IEEE Int. Symp. Hardware Oriented Security and Trust (HOST), pp. 137–143, 2015.
- [11] P. Chakraborty, J. Cruz, and S. Bhunia, “SURF: Joint structural functional attack on logic locking,” in IEEE Int. Symp. Hardware Oriented Security and Trust (HOST), pp. 181–190, 2019.
- [12] Y. Shen, Y. Li, S. Kong, A. Rezaei, and H. Zhou, “SigAttack: New high-level sat-based attack on logic encryptions,” in Design, Automation and Test in Europe Conference and Exhibition (DATE), pp. 940–943, 2019.
- [13] V. V. Menon, G. Kolhe, A. Schmidt, J. Monson, M. French, Y. Hu, P. A. Beerel, and P. Nuzzo, “System-level framework for logic obfuscation with quantified metrics for evaluation,” in Secure Development Conf. (SecDev), pp. 89–100, 2019.
- [14] Y. Hu, V. V. Menon, A. Schmidt, J. Monson, M. French, and P. Nuzzo, “Security-driven metrics and models for efficient evaluation of logic encryption schemes,” in ACM-IEEE Int. Conf. Formal Methods and Models for System Design (MEMOCODE), pp. 1–5, 2019.
- [15] G. Sengar, D. Mukhopadhyay, and D. R. Chowdhury, “Secured flipped scan-chain model for crypto-architecture,” IEEE Trans. Computer-Aided Design of Integrated Circuits and Systems, vol. 26, no. 11, pp. 2080–2084, 2007.
- [16] S. Paul, R. S. Chakraborty, and S. Bhunia, “Vim-scan: A low overhead scan design approach for protection of secret key in scan-based secure chips,” in IEEE VLSI Test Symp. (VTS), pp. 455–460, 2007.
- [17] X. Wang, D. Zhang, M. He, D. Su, and M. Tehranipoor, “Secure scan and test using obfuscation throughout supply chain,” IEEE Trans. Computer-Aided Design of Integrated Circuits and Systems, vol. 37, no. 9, pp. 1867–1880, 2017.
- [18] A. R. Desai, M. S. Hsiao, C. Wang, L. Nazhandali, and S. Hall, “Interlocking obfuscation for anti-tamper hardware,” in Proc. Cyber Security and Information Intelligence Research Workshop, pp. 1–4, 2013.
- [19] Y. Kasarabada, S. R. T. Raman, and R. Vemuri, “Deep state encryption for sequential logic circuits,” in IEEE Computer Society Annual Symp. VLSI (ISVLSI), pp. 338–343, 2019.
- [20] K. Shamsi, M. Li, D. Z. Pan, and Y. Jin, “KC2: Key-condition crunching for fast sequential circuit deobfuscation,” in Design, Automation and Test in Europe Conference and Exhibition (DATE), pp. 534–539, 2019.
- [21] D. Duvalsaint, Z. Liu, A. Ravikumar, and R. Blanton, “Characterization of locked sequential circuits via ATPG,” in IEEE Int. Test Conf. in Asia (ITC-Asia), pp. 97–102, 2019.
- [22] T. Meade, Z. Zhao, S. Zhang, D. Pan, and Y. Jin, “Revisit sequential logic obfuscation: Attacks and defenses,” in IEEE Int. Symp. Circuits and Systems (ISCAS), pp. 1–4, 2017.
- [23] A. Bhargav-Spantzel, A. C. Squicciarini, S. Modi, M. Young, E. Bertino, and S. J. Elliott, “Privacy preserving multi-factor authentication with biometrics,” Journal of Computer Security, vol. 15, no. 5, pp. 529–560, 2007.
- [24] F. Brglez, D. Bryan, and K. Kozminski, “Combinational profiles of sequential benchmark circuits,” in IEEE Int. Symp. Circuits and Systems (ISCAS), pp. 1929–1934, 1989.
- [25] J. Dofe and Q. Yu, “Novel dynamic state-deflection method for gate-level design obfuscation,” IEEE Trans. Computer-Aided Design of Integrated Circuits and Systems, vol. 37, pp. 273–285, Feb. 2018.
- [26] Y. Kasarabada, S. Chen, and R. Vemuri, “On SAT-based attacks on encrypted sequential logic circuits,” in Int. Symp. Quality Electronic Design (ISQED), pp. 204–211, 2019.
- [27] Silvaco, “45nm open cell library,” 2019.
- [28] M. S. Rahman, A. Nahiyan, S. Amir, F. Rahman, F. Farahmandi, D. Forte, and M. Tehranipoor, “Dynamically obfuscated scan chain to resist oracle-guided attacks on logic locked design.,” IACR Cryptol. ePrint Arch., vol. 2019, p. 946, 2019.