🤖 AI Summary
This study addresses the lack of empirical security evaluation of universal circuits (UCs) in hardware intellectual property (IP) protection by systematically assessing their resilience against reverse engineering under two prevailing attack models: oracle-guided (OG) and oracle-less (OL). Through structural leakage analysis and functional recovery rate measurements, the work reveals that OG attacks achieve a success rate near 50%—equivalent to random guessing—while OL attacks are largely ineffective at uncovering circuit structure. These findings demonstrate that UCs effectively conceal both structural and functional information, achieving obfuscation strength approaching that of an ideal random mapping. Consequently, the results substantiate the feasibility and robustness of UCs as a secure mechanism for hardware IP protection.
📝 Abstract
Universal Circuits (UCs) offer a promising approach to hardware Intellectual Property (IP) obfuscation, leveraging cryptographic principles to hide both structure and function in a programmable logic fabric. Their adaptability makes them especially suitable for the globalized Integrated Circuit (IC) supply chain, where security against threats like reverse engineering is crucial. Despite the potential, UC security remains largely unexplored. This work evaluates UC security against state-of-the-art oracle-guided (OG) and oracle-less (OL) attacks. Results show near-random success rates (approx 50%) for OG attacks whereas OL attacks display minimal structural leakage. Collectively, these findings confirm the feasibility of UCs for IP protection.