LSV_Final/
|-- abc/
|-- abc_script/
|-- benchmarks/
|-- bin/
|-- src/
|-- makefile
|-- runall_abc.sh
|-- runall_insertKey.sh
|-- runall_orig.sh
|-- LSV_final_report.pdf
|-- LSV_final_presentation.pdf
`-- README.md
src: Our source codes for implementation of Synthesis for Security.- Type
maketo compile the program. The executable namedobfuscatewill be generated under thebinfolder.make - Type
make cleanto remove theobfuscateunderbin.make clean
- Type
bin: Binary - store theobfuscatebinary executable mentioned above.- Type
to generate an obfuscated netlist
bin/obfuscate benchmarks/c17.v -insertKeyGatec17_out.v.to generate an original netlistbin/obfuscate benchmarks/c17.vc17_orig.vbut in the form that abc can read.
- Type
abc: This folder is the same folder cloned from berkeley abc [5]. Typemakeinside theabcfolder to compile and generate anabcexecutable.benchmarks: This folder contains the some of the benchmarks cloned from [4].runall_orig.sh: Type./runall_orig.shto generate all original netlists but in the form thatabccan read.runall_insertKey.sh: Type./runall_insertKey.shto generate all obfuscated netlists (also can be read byabc).abc_script: Contain scripts read the verilog file and transfrom it into an aig and print out its number and level(depth) of and-gates.- example
c17_out.src:read_verilog c17_out.v strash print_stats - Type
./abc/abc -f c17_out.srcto execute the script and see the statistics of transformed aig.
- example
runall_abc.sh: Typerunall_abc.shto runall the scripts under the folderabc_script. The terminal standard output is redirected to benchmark.v.logunder the folderabc_script.LSV_final_report.pdf: Our final report in the pdf format.LSV_final_presentation.pdf: Our final presentation slides.README.md: Describe what are included in the zip file.
[1] J. Rajendran, Y. Pino, O. Sinanoglu and R. Karri, "Security analysis of logic obfuscation," DAC Design Automation Conference 2012, San Francisco, CA, USA, 2012, pp. 83-89
[2] Jeyavijayan Rajendran, Michael Sam, Ozgur Sinanoglu, and Ramesh Karri. 2013. Security analysis of integrated circuit camouflaging. In Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security (CCS '13). Association for Computing Machinery, New York, NY, USA, 709–720.
[3] Jarrod A. Roy, Farinaz Koushanfar, and Igor L. Markov. 2008. EPIC: ending piracy of integrated circuits. In Proceedings of the conference on Design, automation and test in Europe (DATE '08). Association for Computing Machinery, New York, NY, USA, 1069–1074.