Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

University of South Florida

Theses/Dissertations

2016

Observability

Articles 1 - 1 of 1

Full-Text Articles in Computer Engineering

Methodologies To Exploit Atpg Tools For De-Camouflaging, Deepak Reddy Vontela Oct 2016

Methodologies To Exploit Atpg Tools For De-Camouflaging, Deepak Reddy Vontela

USF Tampa Graduate Theses and Dissertations

Semiconductor supply chain is increasingly getting exposed to Reverse Engineering (RE) of Intellectual Property (IP). Camouflaging of gates in integrated circuits are typically employed to hide the gate functionality to prevent reverse engineering. The functionalities of these gates cannot be found by De-layering as they don’t leave any layout clues. Adversaries perform reverse engineering by replacing the camouflaged gate with the known gate and by developing custom software to determine test patterns. These test patterns are used to analyze the outputs and to conclude the functionality of the camouflaged gate.

In this thesis, we show that reverse engineering of camouflaged …