@inproceedings{7453d6d572f24aaaab83181e9d8d4d1d,
title = "Timing Camouflage Enabled State Machine Obfuscation",
abstract = "State machine obfuscation is an important step to harden circuits against reverse engineering. The work presents a state machine obfuscation enabled by Timing Camouflage. Flip-flops of state machines often have a combinational feedback path. This makes it challenging to directly apply Timing Camouflage. Therefore, we developed two methods to redesign a state machine, such that at least one of its flip-flops is free of combinational feedback paths while the original functionality stays the same. The Timing Camouflage enabled state machine obfuscation additionally allows a beneficial combination with logic locking. The results demonstrate that state-of-the-art techniques fail to extract a correct state machine or show decreased success in extracting a correct secret locking key from an obfuscated design.",
keywords = "FSM extraction, FSM obfuscation, SAT attack, Timing Camouflage, combinational feedback path, sequential reverse engineering",
author = "Michaela Brunner and Tarik Ibrahimpasic and Bing Li and Zhang, {Grace Li} and Ulf Schlichtmann and Georg Sigl",
note = "Publisher Copyright: {\textcopyright} 2022 IEEE.; 2022 IEEE Physical Assurance and Inspection of Electronics, PAINE 2022 ; Conference date: 25-10-2022 Through 27-10-2022",
year = "2022",
doi = "10.1109/PAINE56030.2022.10014810",
language = "English",
series = "2022 IEEE Physical Assurance and Inspection of Electronics, PAINE 2022",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
booktitle = "2022 IEEE Physical Assurance and Inspection of Electronics, PAINE 2022",
}