c3540-NC1820

Contributed by Sarah Amir; University of Florida

Details:

c3540-NC1820

_______________________________________

DESCRIPTION:

  • Original Circuit: ISCAS85 benchmark c3540 [1]
  • Number of Gates: 1672
  • Number of Input: 232( 50 original inputs, 182 key ports)
  • Number of Output: 22
  • Key size = 182
  • (32 keys to obfuscate original circuit,
  • 100 key AntiSAT block,
  • 50 keys to obfuscate AntiSAT block)
  • Key input naming: 'Key_In_[module number]_[input number in module]' for unsynthesized file and 'keyinput[input number]' for synthesized file
  • Synthesis Library: SAED90nm_typ Library (version 2013)

    OBFUSCATION TECHNIQUE(S) IMPLEMENTED:

  • Obfuscation method: Logic cone size based [2]
  • SAT-Attack defense: AntiSAT [3]

    TAXONOMY:

  • Obfuscation Method: Combinational -> Combinational Hybrid -> SAT Defense -> AntiSAT -> Logic cone size based
  • Physical Characteristics -> Obfuscated Netlist Size -> 1000<#gates<5000
  • Key Size -> Other

    CONTACT:

  • Sarah Amir
  • Florida Institute of Cyber Security (FICS)
  • University of Florida
  • sarah.amir@ufl.edu, prema_buet@gmail.com

    REFERENCES:

  • [1] ISCAS85 benchmarks http://www.pld.ttu.ee/~maksim/benchmarks/iscas85/verilog/
  • [2] Narasimhan, Seetharam, Rajat Subhra Chakraborty, and Swarup Chakraborty. "Hardware IP protection during evaluation using embedded sequential trojan." IEEE Design & Test of Computers 29.3 (2012): 70-79.
  • [3] Xie, Yang, and Ankur Srivastava. "Mitigating sat attack on logic locking." International Conference on Cryptographic Hardware and Embedded Systems. Springer Berlin Heidelberg, 2016.
  • [none]