ISSN 2394-5125
 

Review Article 


SECURED NETLIST GENERATION USING OBFUSCATION TECHNIQUE

M. Hemachand, E. Prabhu.

Abstract
Researchers have been conducting research in the field of hardware security for giving the security to the net list. Even camouflaging of the integrated circuit (IC) is not providing any security to the gate level net list. Abundant obfuscation techniques are available but they are not conquering the problem. While using the obfuscation techniques the factors like power, area and cost are given importance. Obfuscation used in this work reduces power, area and cost. In the design if the obfuscation used in this work is inserted, reverse engineering canít extract the gate level net list. Experiments shows that the design with the obfuscation gives less variation in power and area when compared to design without obfuscation.

Key words: Hardware Security, Logic Obfuscation, Overbuilding, Physical Unclonable Function (PUF), Piracy, Reverse Engineering (RE).


 
ARTICLE TOOLS
Abstract
PDF Fulltext
How to cite this articleHow to cite this article
Citation Tools
Related Records
 Articles by M. Hemachand
Articles by E. Prabhu
on Google
on Google Scholar


How to Cite this Article
Pubmed Style

M. Hemachand, E. Prabhu. SECURED NETLIST GENERATION USING OBFUSCATION TECHNIQUE. JCR. 2020; 7(4): 878-881. doi:10.31838/jcr.07.04.167


Web Style

M. Hemachand, E. Prabhu. SECURED NETLIST GENERATION USING OBFUSCATION TECHNIQUE. http://www.jcreview.com/?mno=96145 [Access: May 31, 2021]. doi:10.31838/jcr.07.04.167


AMA (American Medical Association) Style

M. Hemachand, E. Prabhu. SECURED NETLIST GENERATION USING OBFUSCATION TECHNIQUE. JCR. 2020; 7(4): 878-881. doi:10.31838/jcr.07.04.167



Vancouver/ICMJE Style

M. Hemachand, E. Prabhu. SECURED NETLIST GENERATION USING OBFUSCATION TECHNIQUE. JCR. (2020), [cited May 31, 2021]; 7(4): 878-881. doi:10.31838/jcr.07.04.167



Harvard Style

M. Hemachand, E. Prabhu (2020) SECURED NETLIST GENERATION USING OBFUSCATION TECHNIQUE. JCR, 7 (4), 878-881. doi:10.31838/jcr.07.04.167



Turabian Style

M. Hemachand, E. Prabhu. 2020. SECURED NETLIST GENERATION USING OBFUSCATION TECHNIQUE. Journal of Critical Reviews, 7 (4), 878-881. doi:10.31838/jcr.07.04.167



Chicago Style

M. Hemachand, E. Prabhu. "SECURED NETLIST GENERATION USING OBFUSCATION TECHNIQUE." Journal of Critical Reviews 7 (2020), 878-881. doi:10.31838/jcr.07.04.167



MLA (The Modern Language Association) Style

M. Hemachand, E. Prabhu. "SECURED NETLIST GENERATION USING OBFUSCATION TECHNIQUE." Journal of Critical Reviews 7.4 (2020), 878-881. Print. doi:10.31838/jcr.07.04.167



APA (American Psychological Association) Style

M. Hemachand, E. Prabhu (2020) SECURED NETLIST GENERATION USING OBFUSCATION TECHNIQUE. Journal of Critical Reviews, 7 (4), 878-881. doi:10.31838/jcr.07.04.167