| Citation: | Huihong ZHANG, Jing LI, Qiufeng WU, Yuejun ZHANG, Pengjun WANG. Design of Hardware IP Core Security Protection Based on Multi-Level Co-obfuscation[J]. Journal of Electronics & Information Technology, 2021, 43(9): 2458-2465. doi: 10.11999/JEIT210631 | 
 
	                | [1] | 杨亚君, 陈章. 分块制造下硬件木马攻击方法及安全性分析[J]. 西安电子科技大学学报, 2019, 46(4): 167–175. YANG Yajun and CHEN Zhang. Hardware trojan attack methods and security analysis under split manufacturing[J]. Journal of Xidian University, 2019, 46(4): 167–175. | 
| [2] | GUIN U, HUANG K, DIMASE D, et al. Counterfeit integrated circuits: A rising threat in the global semiconductor supply chain[J]. Proceedings of the IEEE, 2014, 102(8): 1207–1228. doi:  10.1109/JPROC.2014.2332291 | 
| [3] | 张跃军, 王佳伟, 潘钊, 等. 基于正交混淆的多硬件IP核安全防护设计[J]. 电子与信息学报, 2019, 41(8): 1847–1854. doi:  10.11999/JEIT180898 ZHANG Yuejun, WANG Jiawei, PAN Zhao, et al. Hardware security for multi IPs protection based on orthogonal obfuscation[J]. Journal of Electronics &Information Technology, 2019, 41(8): 1847–1854. doi:  10.11999/JEIT180898 | 
| [4] | DE A and GHOSH S. Preventing reverse engineering using threshold voltage defined multi-input camouflaged gates[C]. 2017 IEEE International Symposium on Technologies for Homeland Security, Waltham, USA, 2017: 1–6. | 
| [5] | RAJENDRAN J, SAM M, SINANOGLU O, et al. Security analysis of integrated circuit camouflaging[C]. 2013 ACM SIGSAC Conference on Computer & Communications Security, Berlin, Germany, 2013: 709–720. | 
| [6] | 徐金甫, 吴缙, 李军伟, 等. 基于敏感度混淆机制的控制型物理不可克隆函数研究[J]. 电子与信息学报, 2019, 41(7): 1601–1609. doi:  10.11999/JEIT180775 XU Jinfu, WU Jin, LI Junwei, et al. Controlled Physical unclonable function research based on sensitivity confusion mechanism[J]. Journal of Electronics &Information Technology, 2019, 41(7): 1601–1609. doi:  10.11999/JEIT180775 | 
| [7] | 孙子文, 叶乔. 利用震荡环频率特性提取多位可靠信息熵的物理不可克隆函数研究[J]. 电子与信息学报, 2021, 43(1): 234–241. doi:  10.11999/JEIT191013 SUN Ziwen and YE Qiao. Study on the physical unclonable function of the reliable information entropy extracted by the frequency characteristic of oscillating ring[J]. Journal of Electronics &Information Technology, 2021, 43(1): 234–241. doi:  10.11999/JEIT191013 | 
| [8] | ZHANG Jiliang, LIN Yaping, LYU Yongqiang, et al. A PUF-FSM binding scheme for FPGA IP protection and pay-per-device licensing[J]. IEEE Transactions on Information Forensics and Security, 2015, 10(6): 1137–1150. doi:  10.1109/TIFS.2015.2400413 | 
| [9] | ZHANG Jiliang and SHEN Chaoqun. Set-based obfuscation for strong PUFs against machine learning attacks[J]. IEEE Transactions on Circuits and Systems I: Regular Papers, 2021, 68(1): 288–300. doi:  10.1109/TCSI.2020.3028508 | 
| [10] | DOFE J and YU Qiaoyan. Novel dynamic state-deflection method for gate-level design obfuscation[J]. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2018, 37(2): 273–285. doi:  10.1109/TCAD.2017.2697960 | 
| [11] | KOUSHANFAR F. Provably secure active IC metering techniques for piracy avoidance and digital rights management[J]. IEEE Transactions on Information Forensics and Security, 2012, 7(1): 51–63. doi:  10.1109/TIFS.2011.2163307 | 
| [12] | CHAKRABORTY R S and BHUNIA S. RTL hardware IP protection using key-based control and data flow obfuscation[C]. The 23rd International Conference on VLSI Design, Bangalore, India, 2010: 405–410. | 
| [13] | YASIN M, MAZUMDAR B, RAJENDRAN J J V, et al. SARLock: SAT attack resistant logic locking[C]. 2016 IEEE International Symposium on Hardware Oriented Security and Trust, McLean, USA, 2016: 236–241. | 
| [14] | LI Liwei, WANG Pengjun, and ZHANG Yuejun. Design of anti-key leakage camouflage gate circuit for reverse engineering based on dummy vias[J]. Microelectronics Journal, 2019, 90: 163–168. doi:  10.1016/j.mejo.2019.06.006 | 
