Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 1 of 1
Full-Text Articles in Engineering
Methodologies To Exploit Atpg Tools For De-Camouflaging, Deepak Reddy Vontela
Methodologies To Exploit Atpg Tools For De-Camouflaging, Deepak Reddy Vontela
USF Tampa Graduate Theses and Dissertations
Semiconductor supply chain is increasingly getting exposed to Reverse Engineering (RE) of Intellectual Property (IP). Camouflaging of gates in integrated circuits are typically employed to hide the gate functionality to prevent reverse engineering. The functionalities of these gates cannot be found by De-layering as they don’t leave any layout clues. Adversaries perform reverse engineering by replacing the camouflaged gate with the known gate and by developing custom software to determine test patterns. These test patterns are used to analyze the outputs and to conclude the functionality of the camouflaged gate.
In this thesis, we show that reverse engineering of camouflaged …