{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:14:49Z","timestamp":1750220089179,"version":"3.41.0"},"reference-count":54,"publisher":"Association for Computing Machinery (ACM)","issue":"6","license":[{"start":{"date-parts":[[2022,6,27]],"date-time":"2022-06-27T00:00:00Z","timestamp":1656288000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/100000185","name":"Defense Advanced Research Projects Agency","doi-asserted-by":"crossref","award":["FA8650-18-1-7819"],"award-info":[{"award-number":["FA8650-18-1-7819"]}],"id":[{"id":"10.13039\/100000185","id-type":"DOI","asserted-by":"crossref"}]},{"name":"NSF CHEST IUCRC Industrial Support"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Des. Autom. Electron. Syst."],"published-print":{"date-parts":[[2022,11,30]]},"abstract":"<jats:p>Logic locking and Integrated Circuit (IC) camouflaging are the most prevalent protection schemes that can thwart most hardware security threats. However, the state-of-the-art attacks, including Boolean Satisfiability (SAT) and approximation-based attacks, question the efficacy of the existing defense schemes. Recent obfuscation schemes have employed reconfigurable logic to secure designs against various hardware security threats. However, they have focused on specific design elements such as SAT hardness. Despite meeting the focused criterion such as security, obfuscation incurs additional overheads, which are not evaluated in the present works. This work provides an extensive analysis of Look-up-table (LUT)\u2013based obfuscation by exploring several factors such as LUT technology, size, number of LUTs, and replacement strategy as they have a substantial influence on Power-Performance-Area (PPA) and Security (PPA\/S) of the design. We show that using large LUT makes LUT-based obfuscation resilient to hardware security threats. However, it also results in enormous design overheads beyond practical limits.<\/jats:p>\n          <jats:p>\n            To make the reconfigurable logic obfuscation efficient in terms of design overheads, this work proposes a novel LUT architecture where the security provided by the proposed primitive is superior to that of the traditional LUT-based obfuscation. Moreover, we leverage the security-driven design flow, which uses off-the-shelf industrial EDA tools to mitigate the design overheads further while being non-disruptive to the current industrial physical design flow. We empirically evaluate the security of the LUTs against state-of-the-art obfuscation techniques in terms of design overheads and SAT-attack resiliency. Our findings show that the proposed primitive significantly reduces both area and power by a factor of 8\n            <jats:inline-formula content-type=\"math\/tex\">\n              <jats:tex-math notation=\"LaTeX\" version=\"MathJax\">\\( \\times \\)<\/jats:tex-math>\n            <\/jats:inline-formula>\n            and 2\n            <jats:inline-formula content-type=\"math\/tex\">\n              <jats:tex-math notation=\"LaTeX\" version=\"MathJax\">\\( \\times \\)<\/jats:tex-math>\n            <\/jats:inline-formula>\n            , respectively, without compromising security.\n          <\/jats:p>","DOI":"10.1145\/3510421","type":"journal-article","created":{"date-parts":[[2022,2,18]],"date-time":"2022-02-18T19:50:50Z","timestamp":1645213850000},"page":"1-29","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Breaking the Design and Security Trade-off of Look-up-table\u2013based Obfuscation"],"prefix":"10.1145","volume":"27","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7807-6721","authenticated-orcid":false,"given":"Gaurav","family":"Kolhe","sequence":"first","affiliation":[{"name":"University of California, One Shields Avenue, Davis, CA, USA"}]},{"given":"Tyler David","family":"Sheaves","sequence":"additional","affiliation":[{"name":"University of California, One Shields Avenue, Davis, CA, USA"}]},{"given":"Sai Manoj P.","family":"D.","sequence":"additional","affiliation":[{"name":"George Mason University, Fairfax, VA, USA"}]},{"given":"Hamid","family":"Mahmoodi","sequence":"additional","affiliation":[{"name":"San Francisco State University, San Francisco, CA, USA"}]},{"given":"Setareh","family":"Rafatirad","sequence":"additional","affiliation":[{"name":"University of California, One Shields Avenue, Davis, CA, USA"}]},{"given":"Avesta","family":"Sasan","sequence":"additional","affiliation":[{"name":"University of California, One Shields Avenue, Davis, CA, USA"}]},{"given":"Houman","family":"Homayoun","sequence":"additional","affiliation":[{"name":"University of California, One Shields Avenue, Davis, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2022,6,27]]},"reference":[{"key":"e_1_3_2_2_2","first-page":"16","volume-title":"Proceedings of the 16th USENIX Security Symposium on USENIX Security Symposium (SS\u201907)","author":"Alkabani Yousra M.","year":"2007","unstructured":"Yousra M. Alkabani and Farinaz Koushanfar. 2007. Active hardware metering for intellectual property protection and security. In Proceedings of the 16th USENIX Security Symposium on USENIX Security Symposium (SS\u201907). USENIX Association, Article 20, 16 pages. Retrieved from http:\/\/dl.acm.org\/citation.cfm?id=1362903.1362923."},{"key":"e_1_3_2_3_2","doi-asserted-by":"publisher","DOI":"10.1145\/3194554.3194651"},{"key":"e_1_3_2_4_2","doi-asserted-by":"publisher","DOI":"10.1145\/3194554.3194651"},{"key":"e_1_3_2_5_2","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2019.i1.97-122"},{"key":"e_1_3_2_6_2","doi-asserted-by":"publisher","DOI":"10.1109\/MDT.2010.24"},{"key":"e_1_3_2_7_2","doi-asserted-by":"publisher","DOI":"10.23919\/DATE48585.2020.9116544"},{"key":"e_1_3_2_8_2","unstructured":"Ronald P. Cocchi Lap Wai Chow James P. Baukus and Bryan J. Wang. 2013. Method and apparatus for camouflaging a standard cell based integrated circuit with micro circuits and post processing. https:\/\/patents.google.com\/patent\/US8510700B2\/en."},{"key":"e_1_3_2_9_2","doi-asserted-by":"publisher","DOI":"10.1109\/ISQED48828.2020.9137052"},{"key":"e_1_3_2_10_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2021.3138686"},{"key":"e_1_3_2_11_2","doi-asserted-by":"publisher","DOI":"10.5555\/2534766.2534809"},{"key":"e_1_3_2_12_2","doi-asserted-by":"publisher","DOI":"10.1145\/277044.277240"},{"key":"e_1_3_2_13_2","doi-asserted-by":"publisher","DOI":"10.1145\/3400302.3415667"},{"key":"e_1_3_2_14_2","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2010.299"},{"key":"e_1_3_2_15_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAD45719.2019.8942100"},{"key":"e_1_3_2_16_2","doi-asserted-by":"publisher","DOI":"10.1145\/3299874.3319496"},{"key":"e_1_3_2_17_2","doi-asserted-by":"publisher","DOI":"10.1109\/DAC18074.2021.9586242"},{"key":"e_1_3_2_18_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAD45719.2019.8942047"},{"key":"e_1_3_2_19_2","doi-asserted-by":"publisher","DOI":"10.7873\/DATE.2014.256"},{"key":"e_1_3_2_20_2","volume-title":"Proceedings of the Network and Distributed System Security Symposium (NDSS\u201915)","author":"Mohamed M.","year":"2015","unstructured":"M. Mohamed, S. Garg, and M. V. Tripunitara. 2015. Integrated circuit decamouflaging: Reverse engineering camouflaged ICs within minutes. In Proceedings of the Network and Distributed System Security Symposium (NDSS\u201915)."},{"key":"e_1_3_2_21_2","doi-asserted-by":"publisher","DOI":"10.1109\/ISVLSI.2018.00080"},{"key":"e_1_3_2_22_2","doi-asserted-by":"publisher","DOI":"10.1109\/SecDev.2019.00020"},{"key":"e_1_3_2_23_2","first-page":"459","volume-title":"Proceedings of the 10th National Conference on Artificial Intelligence (AAAI\u201992)","author":"Mitchell David","year":"1992","unstructured":"David Mitchell, Bart Selman, and Hector Levesque. 1992. Hard and easy distributions of SAT problems. In Proceedings of the 10th National Conference on Artificial Intelligence (AAAI\u201992). AAAI Press, 459\u2013465."},{"key":"e_1_3_2_24_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30201-8_33"},{"key":"e_1_3_2_25_2","doi-asserted-by":"publisher","DOI":"10.23919\/DATE.2018.8341986"},{"key":"e_1_3_2_26_2","doi-asserted-by":"publisher","DOI":"10.1145\/2228360.2228377"},{"key":"e_1_3_2_27_2","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516656"},{"key":"e_1_3_2_28_2","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2013.193"},{"key":"e_1_3_2_29_2","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2013.193"},{"key":"e_1_3_2_30_2","doi-asserted-by":"publisher","DOI":"10.1109\/tetc.2020.2991134"},{"key":"e_1_3_2_31_2","doi-asserted-by":"publisher","DOI":"10.23919\/DATE.2018.8341984"},{"key":"e_1_3_2_32_2","doi-asserted-by":"publisher","DOI":"10.1145\/3194554.3194596"},{"key":"e_1_3_2_33_2","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2014.2335155"},{"key":"e_1_3_2_34_2","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2010.284"},{"key":"e_1_3_2_35_2","first-page":"95","volume-title":"Hardware Oriented Security and Trust","author":"Shamsi K.","year":"2017","unstructured":"K. Shamsi, M. Li, T. Meade, et al.2017. AppSAT: Approximately deobfuscating integrated circuits. In Hardware Oriented Security and Trust. IEEE, 95\u2013100."},{"key":"e_1_3_2_36_2","doi-asserted-by":"publisher","DOI":"10.1145\/3060403.3060458"},{"key":"e_1_3_2_37_2","doi-asserted-by":"publisher","DOI":"10.1145\/3349569.3351538"},{"key":"e_1_3_2_38_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICTAI.2019.00088"},{"key":"e_1_3_2_39_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2019.00076"},{"key":"e_1_3_2_40_2","doi-asserted-by":"publisher","DOI":"10.1109\/DAC18074.2021.9586330"},{"key":"e_1_3_2_41_2","doi-asserted-by":"publisher","DOI":"10.23919\/DATE.2019.8715163"},{"key":"e_1_3_2_42_2","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2016.243"},{"key":"e_1_3_2_43_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-02777-2_24"},{"key":"e_1_3_2_44_2","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2015.7140252"},{"key":"e_1_3_2_45_2","first-page":"115","article-title":"On the complexity of derivation in propositional calculus","author":"Tseitin G.","year":"1968","unstructured":"G. Tseitin. 1968. On the complexity of derivation in propositional calculus. Studies in Constructive Mathematics and Mathematical Logic. Springer, 115\u2013125.","journal-title":"Studies in Constructive Mathematics and Mathematical Logic"},{"key":"e_1_3_2_46_2","doi-asserted-by":"publisher","DOI":"10.1145\/2897937.2898099"},{"key":"e_1_3_2_47_2","doi-asserted-by":"publisher","DOI":"10.1145\/2906147"},{"key":"e_1_3_2_48_2","first-page":"199","volume-title":"Transactions on Computer-Aided Design of Integrated Circuits and Systems","author":"Xie Y.","year":"2019","unstructured":"Y. Xie and A. Srivastava. 2019. Anti-SAT: Mitigating SAT attack on logic locking. In Transactions on Computer-Aided Design of Integrated Circuits and Systems, Vol. 38. IEEE, 199\u2013207."},{"key":"e_1_3_2_49_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2018.2802870"},{"key":"e_1_3_2_50_2","first-page":"236","volume-title":"Hardware Oriented Security and Trust","author":"Yasin M.","year":"2016","unstructured":"M. Yasin, B. Mazumdar, J. Rajendran, et al.2016. SARLock: SAT attack resistant logic locking. In Hardware Oriented Security and Trust. IEEE, 236\u2013241."},{"key":"e_1_3_2_51_2","doi-asserted-by":"publisher","DOI":"10.1145\/2966986.2967012"},{"key":"e_1_3_2_52_2","doi-asserted-by":"publisher","DOI":"10.1109\/ASPDAC.2017.7858346"},{"key":"e_1_3_2_53_2","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133985"},{"key":"e_1_3_2_54_2","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133985"},{"key":"e_1_3_2_55_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2710954"}],"container-title":["ACM Transactions on Design Automation of Electronic Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3510421","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3510421","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3510421","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:09:45Z","timestamp":1750183785000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3510421"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6,27]]},"references-count":54,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2022,11,30]]}},"alternative-id":["10.1145\/3510421"],"URL":"https:\/\/doi.org\/10.1145\/3510421","relation":{},"ISSN":["1084-4309","1557-7309"],"issn-type":[{"type":"print","value":"1084-4309"},{"type":"electronic","value":"1557-7309"}],"subject":[],"published":{"date-parts":[[2022,6,27]]},"assertion":[{"value":"2021-05-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2022-01-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2022-06-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}