Opening the Doors to Dynamic Camouflaging: Harnessing the Power of Polymorphic Devices

Nikhil Rangarajan, Satwik Patnaik, Johann Knechtel, Ramesh Karri, Ozgur Sinanoglu, Shaloo Rakheja

Hardware-centric security threats have emerged in every stage of the IC supply chain. Prior defenses have been developed to protect against intellectual property (IP) piracy at different stages. However, so far only logic locking can protect the IP end to end. We present dynamic camouflaging to thwart IP reverse engineering at all stages in the supply chain. We exploit the multi-functionality, post-fabrication reconfigurability, and run-time polymorphism of spin-based devices, specifically the magneto-electric spin-orbit (MESO) device. Leveraging these properties, dynamic camouflaging is resilient to state-of-the-art attacks such as SAT, approximate SAT (AppSAT) and HackTest, and can further impede side-channel analysis. For MESO-based full-chip dynamic camouflaging we anticipate massive improvements in power (7,400x), performance (5.9x), and area (73x) over spin- and CMOS-based camouflaging. We outline the prospects of dynamic camouflaging for error-tolerant image processing applications.

Knowledge Graph

arrow_drop_up

Comments

Sign up or login to leave a comment