Our new X account is live! Follow @wizwand_team for updates
WorkDL logo mark

Designing with Deception: ML- and Covert Gate-Enhanced Camouflaging to Thwart IC Reverse Engineering

About

Integrated circuits (ICs) are essential to modern electronic systems, yet they face significant risks from physical reverse engineering (RE) attacks that compromise intellectual property (IP) and overall system security. While IC camouflage techniques have emerged to mitigate these risks, existing approaches largely focus on localized gate modifications, neglecting comprehensive deception strategies. To address this gap, we present a machine learning (ML)-driven methodology that integrates cryptic and mimetic cyber deception principles to enhance IC security against RE. Our approach leverages a novel And-Inverter Graph Variational Autoencoder (AIG-VAE) to encode circuit representations, enabling dual-layered camouflage through functional preservation and appearance mimicry. By introducing new variants of covert gates -- Fake Inverters, Fake Buffers, and Universal Transmitters -- our methodology achieves robust protection by obscuring circuit functionality while presenting misleading appearances. Experimental results demonstrate the effectiveness of our strategy in maintaining circuit functionality while achieving high camouflage and similarity scores with minimal structural overhead. Additionally, we validate the robustness of our method against advanced artificial intelligence (AI)-enhanced RE attacks, highlighting its practical applicability in securing IC designs. By bridging the gap in mimetic deception for hardware security, our work sets a new standard for IC camouflage, advancing the application of cyber deception principles to protect critical systems from adversarial threats.

Junling Fan, David Koblah, Domenic Forte• 2025

Related benchmarks

TaskDatasetResultRank
GNN-based Reverse Engineering Resiliencec17 vs mux_4 Tiny
F1 (Expose)28
3
GNN-based Reverse Engineering Resiliencec499 (Small) vs banyan_16
F1 Expose33
3
GNN-based Reverse Engineering Resiliencec5315 Medium vs i2c
F1 (Expose)45
3
GNN-based Reverse Engineering Resiliencec6288 Medium vs bar
F1 (Expose)31
3
GNN-based Reverse Engineering Resiliencebanyan_8 Small vs ctrl
F1 Score (Expose)17
3
GNN-based Reverse Engineering Resiliencec1908 (Small) vs c1355
F1 (Expose)26
3
Hardware IP CamouflageTiny c17 mux_4
Area1.55
3
Hardware IP CamouflageBanyan 8 Small Ctrl
Area Ratio1.68
3
Hardware IP CamouflageSmall c499 banyan_16
Area1.43
3
Hardware IP CamouflageMedium c5315 i2c
Area1.4
3
Showing 10 of 12 rows

Other info

Follow for update