LSV_Final/
|-- abc/
|-- abc_script/
|-- benchmarks/
|-- bin/
|-- src/
|-- makefile
|-- runall_abc.sh
|-- runall_insertKey.sh
|-- runall_orig.sh
|-- LSV_final_report.pdf
|-- LSV_final_presentation.pdf
`-- README.md
src
: Our source codes for implementation of Synthesis for Security.- Type
make
to compile the program. The executable namedobfuscate
will be generated under thebin
folder.make
- Type
make clean
to remove theobfuscate
underbin
.make clean
- Type
bin
: Binary - store theobfuscate
binary executable mentioned above.- Type
to generate an obfuscated netlist
bin/obfuscate benchmarks/c17.v -insertKeyGate
c17_out.v
.to generate an original netlistbin/obfuscate benchmarks/c17.v
c17_orig.v
but in the form that abc can read.
- Type
abc
: This folder is the same folder cloned from berkeley abc [5]. Typemake
inside theabc
folder to compile and generate anabc
executable.benchmarks
: This folder contains the some of the benchmarks cloned from [4].runall_orig.sh
: Type./runall_orig.sh
to generate all original netlists but in the form thatabc
can read.runall_insertKey.sh
: Type./runall_insertKey.sh
to generate all obfuscated netlists (also can be read byabc
).abc_script
: Contain scripts read the verilog file and transfrom it into an aig and print out its number and level(depth) of and-gates.- example
c17_out.src
:read_verilog c17_out.v strash print_stats
- Type
./abc/abc -f c17_out.src
to execute the script and see the statistics of transformed aig.
- example
runall_abc.sh
: Typerunall_abc.sh
to runall the scripts under the folderabc_script
. The terminal standard output is redirected to benchmark.v.log
under the folderabc_script
.LSV_final_report.pdf
: Our final report in the pdf format.LSV_final_presentation.pdf
: Our final presentation slides.README.md
: Describe what are included in the zip file.
[1] J. Rajendran, Y. Pino, O. Sinanoglu and R. Karri, "Security analysis of logic obfuscation," DAC Design Automation Conference 2012, San Francisco, CA, USA, 2012, pp. 83-89
[2] Jeyavijayan Rajendran, Michael Sam, Ozgur Sinanoglu, and Ramesh Karri. 2013. Security analysis of integrated circuit camouflaging. In Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security (CCS '13). Association for Computing Machinery, New York, NY, USA, 709–720.
[3] Jarrod A. Roy, Farinaz Koushanfar, and Igor L. Markov. 2008. EPIC: ending piracy of integrated circuits. In Proceedings of the conference on Design, automation and test in Europe (DATE '08). Association for Computing Machinery, New York, NY, USA, 1069–1074.