Red Teaming Methodology for Design Obfuscation
By: Yuntao Liu , Abir Akib , Zelin Lu and more
Potential Business Impact:
Finds hidden secrets in computer chips.
The main goal of design obfuscation schemes is to protect sensitive design details from untrusted parties in the VLSI supply chain, including but not limited to off-shore foundries and untrusted end users. In this work, we provide a systematic red teaming approach to evaluate the security of design obfuscation approaches. Specifically, we propose security metrics and evaluation methodology for the scenarios where the adversary does not have access to a working chip. A case study on the RIPPER tool developed by the University of Florida indicates that more information is leaked about the structure of the original design than commonly considered.
Similar Papers
Building Safe GenAI Applications: An End-to-End Overview of Red Teaming for Large Language Models
Computation and Language
Finds and fixes problems in smart computer programs.
Empirical Assessment of the Code Comprehension Effort Needed to Attack Programs Protected with Obfuscation
Cryptography and Security
Makes software harder to hack and steal.
Obelix: Mitigating Side-Channels Through Dynamic Obfuscation
Cryptography and Security
Protects secret computer code and data from hackers.