1、White-Box Logic Obfuscation:A Transparent Solution to Hardware Piracy and Reverse EngineeringLeon Li and Alex Orailoglu,UC San Diego30th Asia and South Pacific Design Automation Conference|January 23,2025 The industry has evolved into a deeply interconnected web of global partners.Constant movement
2、of intellectual products across trust boundaries:IP vendor chip designer chip designer foundry/SAT production marketGlobalization of Integrated Circuit(IC)IndustrySource:QualcommCommercialEnvironmentFoundry&SATChipDesignIPCores23Growing Efficiency in Hardware DesignCustom Chip Design Embeds More IP
3、in a Hardware FormatPervasiveness of ICs in SocietyIncreasing Demand for Protection AgainstHardware Piracy and Reverse EngineeringHardware Piracy and Reverse Engineering12%4%63%21%Reused Commercial Hardware/IPReused Public Domain Hardware/IPReused In-house Hardware/IPNo Hardware IP ReuseMobile Phone
4、sIndustrial ControlWearable DevicesSmart HomesHealth CareUrban InfrastructureCommunicationReverse Engineering(RE)Levels4Stage 1:Fundamental&Applied StudiesStage 2:R&DStage 3:Product DevelopmentStage 4:ProductionEngineering OutcomesVenture Analysis,Design&Production TechnologySystem/Algorithmic/Archi
5、tectural Design&FeaturesLayout,Fabrication Plan,Testing PlanSerial Production Strategy,Fabricated ChipsMalicious RE ObjectivesN/AAdded-value,Competitive ProductsCounterfeits,ClonesPart Recycling,Gray Market SalesBenign RE ApplicationsN/ADetection of(soft)IP infringementsDetection of CounterfeitsTroj
6、an Detection,Device CharacterizationRE CostN/A$“The process of reproducing a product,a part or a system of it based on the product itself without original drawings,technical documentation,or computer models”TrustedEnvironmentLogic Obfuscation(LO)5 A design-for-trust technique to shield against pirac