{"id":76,"date":"2022-03-24T18:09:20","date_gmt":"2022-03-24T18:09:20","guid":{"rendered":"https:\/\/www.isi.edu\/research-groups-rcg\/?page_id=76"},"modified":"2023-10-04T12:36:54","modified_gmt":"2023-10-04T12:36:54","slug":"mirage","status":"publish","type":"page","link":"https:\/\/www.isi.edu\/research-groups-rcg\/projects\/current-projects\/mirage\/","title":{"rendered":"Mirage: A Security Metrics Driven Obfuscation Design Environment"},"content":{"rendered":"\n\n\t<header>\n<h2>Project Navigation<\/h2>\n<ul>\n<li><a href=\"#overview\">Overview<\/a><\/li>\n<li><a href=\"#publications\">Publications<\/a><\/li>\n<li><a href=\"#people\">People<\/a><\/li>\n<li><a href=\"#sponsors\">Sponsors<\/a><\/li>\n<\/ul>\n<\/header>\n<section>\n    <h2>Overview<\/h2>\n<\/section>\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.isi.edu\/research-groups-rcg\/wp-content\/uploads\/sites\/17\/2022\/03\/mg_front.png\" alt=\"mg_front\" height=\"600\" width=\"732\" title=\"mg_front\" \/>\n\t<p>In today&#8217;s global marketplace, IP protection is becoming a serious concern in ASIC development. Circuit-level obfuscation is a potentially viable solution, however no common metrics exist to evaluate these techniques and no design tools exist to guide and validate implementation. Mirage utilizes quantitative security and overhead metrics to ascertain which obfuscation techniques provide realistic levels of security and utilizes state of the art design space exploration techniques to select and apply the best techniques for a given circuit.<\/p>\n<p>Mirage is principally composed of a front end Obfuscation Design Space Exploration engine which utilizes feedback from security metrics to drive selection of obfuscation IP and is interoperable with standard ASIC EDA tools. Mirage utilizes Design Space Exploration (DSE) algorithms well suited for large search spaces leveraging intelligent pruning and compositional reasoning. The Security-centric metrics that are applicable to both passive and active obfuscation techniques. Mirage focuses on unified, adversary centric models that are applicable across a range of obfuscation types. In addition to overhead metrics, Mirage also provides techniques for verification of the correct application of the obfuscation.<\/p>\n<p>The material is based on research sponsored by the Air Force Research Labs (AFRL) and the Defense Advanced Projects Agency (DARPA) under agreement number FA8650-18-1-7817. The U.S. Government is authorized to reproduce and distribute reprints for Government purposes notwithstanding any copyright notation thereon. The views and conclusions contained herein are those of the authors and should not be interpreted as necessarily representing the official policies or endorsements, either expressed or implied, of the Air Force Research Labs (AFRL), the Defense Advanced Projects Agency (DARPA), or the U.S. Government. This work is also supported by generous donations from Synopsys and Cadence.<\/p>\n<section>\n    <h2>Publications<\/h2>\n<\/section>\n\t<a href=\"https:\/\/arxiv.org\/abs\/2305.05870\">Similarity-Based Logic Locking Against Machine Learning Attacks<\/a><br \/>\nS. D. Chowdhury, K. Yang, and P. Nuzzo, <em>Design Automation Conference (DAC)<\/em>, Jul. 2023.\n<a href=\"https:\/\/arxiv.org\/abs\/2305.00107\">Unraveling Latch Locking Using Machine Learning, Boolean Analysis, and ILP<\/a><br \/>\nD. Chen, X. Zhou, Y. Hu, Y. Zhang, K. Yang, A. Rittenbach, P. Nuzzo, and P. A. Beerel, <em>International Symposium on Quality Electronic Design (ISQED)<\/em>, Apr. 2023.\n<a href=\"https:\/\/ieeexplore.ieee.org\/document\/10061617\">On the Security of Sequential Logic Locking Against Oracle-Guided Attacks<\/a><br \/>\nY. Hu, Y. Zhang, K. Yang, D. Chen, P. A. Beerel, P. Nuzzo, <em>IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems (TCAD)<\/em>, Mar. 2023.\n<a href=\"https:\/\/ieeexplore.ieee.org\/document\/9774649\">TriLock: IC Protection with Tunable Corruptibility and Resilience to SAT and Removal Attacks<\/a><br \/>\nY. Zhang, Y. Hu, P. Nuzzo, P. A. Beerel, <em>Proc. Design Automation and Test in Europe Conference (DATE)<\/em>, Mar. 2022.\n<a href=\"https:\/\/tches.iacr.org\/index.php\/TCHES\/article\/view\/9482\">Towards a Formal Treatment of Logic Locking<\/a><br \/>\nP. A. Beerel, M. Georgiou, B. Hamlin, A. J. Malozemoff, P. Nuzzo, <em>IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES)<\/em>, pp. 92-114, Feb. 2022.\n<a href=\"https:\/\/arxiv.org\/abs\/2108.04892\">Fun-SAT: Functional Corruptibility-Guided SAT-Based Attack on Sequential Logic Encryption<\/a><br \/>\nY. Hu, Y. Zhang, K. Yang, D. Chen, P. A. Beerel, P. Nuzzo,\u00a0<em>Proc. IEEE International Symposium on Hardware Oriented Security and Trust (HOST)<\/em>, Dec. 2021.\n<a href=\"https:\/\/arxiv.org\/abs\/2112.00806\">ReIGNN: State Register Identification Using Graph Neural Networks for Circuit Reverse Engineering<\/a><br \/>\nS. Dutta Chowdhury, K. Yang, P. Nuzzo, <em>Proc. Int. Conf. Computer Aided Design (ICCAD)<\/em>, Nov. 2021.\n<a href=\"https:\/\/link.springer.com\/chapter\/10.1007\/978-3-030-81641-4_12\">SANSCrypt: Sporadic-Authentication-Based Sequential Logic Encryption<\/a><br \/>\nY. Hu, K. Yang, S. Nazarian, P. Nuzzo, <em>VLSI-SoC: Design Trends<\/em>, <em>Springer<\/em>, pp. 255-278, Jul. 2021.\n<a href=\"https:\/\/ieeexplore.ieee.org\/document\/9401458\">Enhancing SAT-Attack Resiliency and Cost-Effectiveness of Reconfigurable-Logic-Based Circuit Obfuscation<\/a><br \/>\nS. Dutta Chowdhury, G. Zhang, Y. Hu, P. Nuzzo, <em>Proc. IEEE Int. Symp. Circuits and Systems (ISCAS)<\/em>, pp. 1-5, May 2021.\n<a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/9473956\">Risk-Aware Cost-Effective Design Methodology for Integrated Circuit Locking<\/a><br \/>\nY. Hu, K. Yang, S. Dutta Chowdhury, P. Nuzzo, <em>Proc. IEEE\/ACM Design Automation and Test in Europe Conf. (DATE)<\/em>, pp. 1182-1185, Feb. 2021.\n<a href=\"https:\/\/ieeexplore.ieee.org\/document\/9344079\">SANSCrypt: A Sporadic-Authentication-Based Sequential Logic Encryption Scheme<\/a><br \/>\nY. Hu, K. Yang, S. Nazarian, P. Nuzzo, <em>Proc. IFIP\/IEEE Int. Conf. Very Large-Scale Integration (VLSI-SoC)<\/em>, pp. 129-134, Oct. 2020.\n<a href=\"https:\/\/dl.acm.org\/citation.cfm?id=3361207\">Security-driven Metrics and Models for Efficient Evaluation of Logic Encryption Schemes<\/a><br \/>\nY. Hu, V. V. Menon, A. Schmidt, J. Monson, M. French, and P. Nuzzo, <em>Proc. Int. Conf. on Formal Methods and Models for System Design (MEMOCODE)<\/em>, p. 9, pp. 1-5, Oct. 2019.\n<a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/8901558\">System-Level Framework for Logic Obfuscation with Quantified Metrics for Evaluation<\/a><br \/>\nV. V. Menon, G. Kolhe, A. Schmidt, J. Monson, M. French, Y. Hu, P. A. Beerel, P. Nuzzo, <em>IEEE Cybersecurity Development Conf. (SecDev)<\/em>, pp. 89-100, Sep. 2019.\n<a title=\"Click to open the Paper\" href=\"https:\/\/www.isi.edu\/sites\/default\/files\/users\/srawal\/Improved_Metrics_for_Obfuscated_Chips.pdf\" target=\"_blank\" rel=\"noopener\">Improved Metrics for Obfuscated ICs.<\/a><br \/>\nM. Zhu, M. French, and P. Beerel,\u00a0<em>Government Microcircuit Applications and Critical Technology Conference (GOMACTech)<\/em>, 2018.<br \/>\n<a title=\"Click to open the Paper\" href=\"https:\/\/www.isi.edu\/sites\/default\/files\/users\/srawal\/Improved_Metrics_for_Obfuscated_Chips.pdf\" target=\"_blank\" rel=\"noopener\">Paper<\/a> |\u00a0<a title=\"Click to open PPT file\" href=\"https:\/\/www.isi.edu\/sites\/default\/files\/users\/srawal\/Mutian_Zhu_3.8.2018.pab_.v2.pdf\" target=\"_blank\" rel=\"noopener\">Presentation<\/a>\n<section>\n    <h2>People<\/h2>\n<\/section>\n<h2>\n\t\tLeadership\n\t<\/h2>\n<article>\n  <figure><a href=\"https:\/\/www.isi.edu\/directory\/mfrench\/\" target=\"_self\" rel=\"noopener\"><img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.isi.edu\/research-groups-rcg\/wp-content\/uploads\/sites\/17\/2023\/08\/mfrench-5.jpg\" alt=\"\" \/><\/a><\/figure><a href=\"https:\/\/www.isi.edu\/directory\/mfrench\/\" target=\"_self\" rel=\"noopener\"><h3>Matthew French<\/h3><\/a>Principal Investigator<\/article>\n<article>\n  <figure><a href=\"https:\/\/viterbi.usc.edu\/directory\/faculty\/Nuzzo\/Pierluigi\" target=\"_self\" rel=\"noopener\"><img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.isi.edu\/research-groups-rcg\/wp-content\/uploads\/sites\/17\/2023\/09\/pierluigi.jpg\" alt=\"\" \/><\/a><\/figure><a href=\"https:\/\/viterbi.usc.edu\/directory\/faculty\/Nuzzo\/Pierluigi\" target=\"_self\" rel=\"noopener\"><h3>Pierluigi Nuzzo<\/h3><\/a>Co-Principal Investigator<\/article>\n<article>\n  <figure><a href=\"https:\/\/viterbi.usc.edu\/directory\/faculty\/Beerel\/Peter\" target=\"_self\" rel=\"noopener\"><img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.isi.edu\/research-groups-rcg\/wp-content\/uploads\/sites\/17\/2023\/09\/peterbeerel-1.jpg\" alt=\"\" \/><\/a><\/figure><a href=\"https:\/\/viterbi.usc.edu\/directory\/faculty\/Beerel\/Peter\" target=\"_self\" rel=\"noopener\"><h3>Peter Beerel<\/h3><\/a>Co-Principal Investigator<\/article>\n<h2>\n\t\tResearch Staff\n\t<\/h2>\n<article>\n  <figure><a href=\"https:\/\/www.isi.edu\/directory\/aschmidt\/\" target=\"_self\" rel=\"noopener\"><img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.isi.edu\/research-groups-rcg\/wp-content\/uploads\/sites\/17\/2023\/08\/aschmidt-2.jpg\" alt=\"\" \/><\/a><\/figure><a href=\"https:\/\/www.isi.edu\/directory\/aschmidt\/\" target=\"_self\" rel=\"noopener\"><h3>Andrew Schmidt<\/h3><\/a>Research Staff<\/article>\n<article>\n  <figure><a href=\"https:\/\/www.isi.edu\/directory\/breynwar\/\" target=\"_self\" rel=\"noopener\"><img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.isi.edu\/research-groups-rcg\/wp-content\/uploads\/sites\/17\/2023\/08\/breynwar-1.jpg\" alt=\"\" \/><\/a><\/figure><a href=\"https:\/\/www.isi.edu\/directory\/breynwar\/\" target=\"_self\" rel=\"noopener\"><h3>Benedict Reynwar<\/h3><\/a>Research Staff<\/article>\n<article>\n  <figure><a href=\"https:\/\/www.isi.edu\/directory\/tharoldsen\/\" target=\"_self\" rel=\"noopener\"><img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.isi.edu\/research-groups-rcg\/wp-content\/uploads\/sites\/17\/2023\/08\/travis-haroldsen.jpg\" alt=\"\" \/><\/a><\/figure><a href=\"https:\/\/www.isi.edu\/directory\/tharoldsen\/\" target=\"_self\" rel=\"noopener\"><h3>Travis Haroldsen<\/h3><\/a>Research Staff<\/article>\n<article>\n  <figure><a href=\"https:\/\/www.isi.edu\/directory\/dkang\/\" target=\"_self\" rel=\"noopener\"><img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.isi.edu\/research-groups-rcg\/wp-content\/uploads\/sites\/17\/2023\/09\/dkang-1.jpg\" alt=\"\" \/><\/a><\/figure><a href=\"https:\/\/www.isi.edu\/directory\/dkang\/\" target=\"_self\" rel=\"noopener\"><h3>Dong-In Kang<\/h3><\/a>Research Staff<\/article>\n<article>\n  <figure><a href=\"https:\/\/www.isi.edu\/people\/jmonson\/about\" target=\"_self\" rel=\"noopener\"><img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.isi.edu\/research-groups-rcg\/wp-content\/uploads\/sites\/17\/2023\/08\/blank-profile.jpg\" alt=\"\" \/><\/a><\/figure><a href=\"https:\/\/www.isi.edu\/people\/jmonson\/about\" target=\"_self\" rel=\"noopener\"><h3>Joshua Monson<\/h3><\/a>Research Staff<\/article>\n<article>\n  <figure><img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.isi.edu\/research-groups-rcg\/wp-content\/uploads\/sites\/17\/2023\/08\/blank-profile.jpg\" alt=\"\" \/><\/figure><h3>Samuel Skalicky<\/h3>Research Staff<\/article>\n<article>\n  <figure><img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.isi.edu\/research-groups-rcg\/wp-content\/uploads\/sites\/17\/2023\/08\/blank-profile.jpg\" alt=\"\" \/><\/figure><h3>Vivek Venugopalan<\/h3>Research Staff<\/article>\n<article>\n  <figure><a href=\"https:\/\/www.isi.edu\/directory\/tsung\/\" target=\"_self\" rel=\"noopener\"><img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.isi.edu\/research-groups-rcg\/wp-content\/uploads\/sites\/17\/2023\/08\/tsung-2.jpg\" alt=\"\" \/><\/a><\/figure><a href=\"https:\/\/www.isi.edu\/directory\/tsung\/\" target=\"_self\" rel=\"noopener\"><h3>Ting-Yuan Sung<\/h3><\/a>Research Staff<\/article>\n<article>\n  <figure><a href=\"https:\/\/www.isi.edu\/directory\/arittenb\/\" target=\"_self\" rel=\"noopener\"><img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.isi.edu\/research-groups-rcg\/wp-content\/uploads\/sites\/17\/2023\/09\/andrew-rittenbach.jpg\" alt=\"\" \/><\/a><\/figure><a href=\"https:\/\/www.isi.edu\/directory\/arittenb\/\" target=\"_self\" rel=\"noopener\"><h3>Andrew Rittenbach<\/h3><\/a>Research Staff<\/article>\n<article>\n  <figure><a href=\"https:\/\/www.isi.edu\/directory\/youngcho\/\" target=\"_self\" rel=\"noopener\"><img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.isi.edu\/research-groups-rcg\/wp-content\/uploads\/sites\/17\/2023\/09\/youngcho.jpg\" alt=\"\" \/><\/a><\/figure><a href=\"https:\/\/www.isi.edu\/directory\/youngcho\/\" target=\"_self\" rel=\"noopener\"><h3>Young Cho<\/h3><\/a>Research Staff<\/article>\n\t<h3>Research Assistants<\/h3>\n<strong>Subhajit Dutta Chowdry<\/strong><br \/>\n<strong>Yinghua Hu<\/strong><br \/>\n<strong>Kaixin Yang<\/strong><br \/>\n<strong>Zhiyu Ni<\/strong><br \/>\n<strong>Mutian Zhu<br \/>\nMeghana Thommondru<br \/>\nJoseph Fifty<br \/>\nManoj Bhavani Sankar Poturaju<br \/>\nRakibul Hassan<br \/>\nRichard Becker<br \/>\nRishik Dutta<br \/>\nSanket Sanjay Shukla<br \/>\nShervin Roshani Sefat<br \/>\nUddipt Sharma<br \/>\nHunain Ali Shamsi<br \/>\nDake Chen<br \/>\nYue Hu<br \/>\nYuke Zhang<br \/>\n<\/strong>\n<h3>Interns<\/h3>\n<strong>Gaurav Kohle<\/strong><br \/>\n<strong>Dhanush Srinivasa<\/strong>\n<h2>Collaborators<\/h2>\n<h3><strong>Georgia Tech Research Institute (GTRI)<\/strong><\/h3>\n<strong>Greg Mohler<\/strong>, Sub PI<strong><br \/>\n<\/strong>\n<h3><strong>Galois<\/strong><\/h3>\n<p><strong>Alex Malozemoff<\/strong>, Sub PI<\/p>\n<h3><strong>New York University<\/strong><\/h3>\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.isi.edu\/research-groups-rcg\/wp-content\/uploads\/sites\/17\/2023\/08\/gtri-150x150.jpg\" alt=\"gtri\" height=\"150\" width=\"150\" title=\"gtri\" \/>\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.isi.edu\/research-groups-rcg\/wp-content\/uploads\/sites\/17\/2023\/08\/galois.png\" alt=\"galois\" height=\"100\" width=\"347\" title=\"galois\" \/>\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.isi.edu\/research-groups-rcg\/wp-content\/uploads\/sites\/17\/2023\/08\/nyu-212x300.png\" alt=\"nyu\" height=\"300\" width=\"212\" title=\"nyu\" \/>\n<section>\n    <h2>Sponsors<\/h2>\n<\/section>\n\n","protected":false},"excerpt":{"rendered":"<p>Project Navigation Overview Publications People Sponsors Overview In today&#8217;s global marketplace, IP protection is becoming a serious concern in ASIC development. Circuit-level obfuscation is a potentially viable solution, however no common metrics exist to evaluate these techniques and no design tools exist to guide and validate implementation. Mirage utilizes quantitative security and overhead metrics to&hellip;<\/p>\n","protected":false},"author":421,"featured_media":0,"parent":292,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"news_source":"","news_author":"","external_news_link":"","footnotes":""},"class_list":["post-76","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Mirage: A Security Metrics Driven Obfuscation Design Environment - Reconfigurable Computing Group<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.isi.edu\/research-groups-rcg\/projects\/current-projects\/mirage\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Mirage: A Security Metrics Driven Obfuscation Design Environment - Reconfigurable Computing Group\" \/>\n<meta property=\"og:description\" content=\"Project Navigation Overview Publications People Sponsors Overview In today&#8217;s global marketplace, IP protection is becoming a serious concern in ASIC development. Circuit-level obfuscation is a potentially viable solution, however no common metrics exist to evaluate these techniques and no design tools exist to guide and validate implementation. Mirage utilizes quantitative security and overhead metrics to&hellip;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.isi.edu\/research-groups-rcg\/projects\/current-projects\/mirage\/\" \/>\n<meta property=\"og:site_name\" content=\"Reconfigurable Computing Group\" \/>\n<meta property=\"article:modified_time\" content=\"2023-10-04T12:36:54+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.isi.edu\/research-groups-rcg\/wp-content\/uploads\/sites\/17\/2022\/03\/mg_front.png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.isi.edu\/research-groups-rcg\/projects\/current-projects\/mirage\/\",\"url\":\"https:\/\/www.isi.edu\/research-groups-rcg\/projects\/current-projects\/mirage\/\",\"name\":\"Mirage: A Security Metrics Driven Obfuscation Design Environment - Reconfigurable Computing Group\",\"isPartOf\":{\"@id\":\"https:\/\/www.isi.edu\/research-groups-rcg\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.isi.edu\/research-groups-rcg\/projects\/current-projects\/mirage\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.isi.edu\/research-groups-rcg\/projects\/current-projects\/mirage\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.isi.edu\/research-groups-rcg\/wp-content\/uploads\/sites\/17\/2022\/03\/mg_front.png\",\"datePublished\":\"2022-03-24T18:09:20+00:00\",\"dateModified\":\"2023-10-04T12:36:54+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.isi.edu\/research-groups-rcg\/projects\/current-projects\/mirage\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.isi.edu\/research-groups-rcg\/projects\/current-projects\/mirage\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.isi.edu\/research-groups-rcg\/projects\/current-projects\/mirage\/#primaryimage\",\"url\":\"https:\/\/www.isi.edu\/research-groups-rcg\/wp-content\/uploads\/sites\/17\/2022\/03\/mg_front.png\",\"contentUrl\":\"https:\/\/www.isi.edu\/research-groups-rcg\/wp-content\/uploads\/sites\/17\/2022\/03\/mg_front.png\",\"width\":732,\"height\":600},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.isi.edu\/research-groups-rcg\/projects\/current-projects\/mirage\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.isi.edu\/research-groups-rcg\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Projects\",\"item\":\"https:\/\/www.isi.edu\/research-groups-rcg\/projects\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Current Projects\",\"item\":\"https:\/\/www.isi.edu\/research-groups-rcg\/projects\/current-projects\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Mirage: A Security Metrics Driven Obfuscation Design Environment\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.isi.edu\/research-groups-rcg\/#website\",\"url\":\"https:\/\/www.isi.edu\/research-groups-rcg\/\",\"name\":\"Reconfigurable Computing Group\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.isi.edu\/research-groups-rcg\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Mirage: A Security Metrics Driven Obfuscation Design Environment - Reconfigurable Computing Group","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.isi.edu\/research-groups-rcg\/projects\/current-projects\/mirage\/","og_locale":"en_US","og_type":"article","og_title":"Mirage: A Security Metrics Driven Obfuscation Design Environment - Reconfigurable Computing Group","og_description":"Project Navigation Overview Publications People Sponsors Overview In today&#8217;s global marketplace, IP protection is becoming a serious concern in ASIC development. Circuit-level obfuscation is a potentially viable solution, however no common metrics exist to evaluate these techniques and no design tools exist to guide and validate implementation. Mirage utilizes quantitative security and overhead metrics to&hellip;","og_url":"https:\/\/www.isi.edu\/research-groups-rcg\/projects\/current-projects\/mirage\/","og_site_name":"Reconfigurable Computing Group","article_modified_time":"2023-10-04T12:36:54+00:00","og_image":[{"url":"https:\/\/www.isi.edu\/research-groups-rcg\/wp-content\/uploads\/sites\/17\/2022\/03\/mg_front.png","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.isi.edu\/research-groups-rcg\/projects\/current-projects\/mirage\/","url":"https:\/\/www.isi.edu\/research-groups-rcg\/projects\/current-projects\/mirage\/","name":"Mirage: A Security Metrics Driven Obfuscation Design Environment - Reconfigurable Computing Group","isPartOf":{"@id":"https:\/\/www.isi.edu\/research-groups-rcg\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.isi.edu\/research-groups-rcg\/projects\/current-projects\/mirage\/#primaryimage"},"image":{"@id":"https:\/\/www.isi.edu\/research-groups-rcg\/projects\/current-projects\/mirage\/#primaryimage"},"thumbnailUrl":"https:\/\/www.isi.edu\/research-groups-rcg\/wp-content\/uploads\/sites\/17\/2022\/03\/mg_front.png","datePublished":"2022-03-24T18:09:20+00:00","dateModified":"2023-10-04T12:36:54+00:00","breadcrumb":{"@id":"https:\/\/www.isi.edu\/research-groups-rcg\/projects\/current-projects\/mirage\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.isi.edu\/research-groups-rcg\/projects\/current-projects\/mirage\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.isi.edu\/research-groups-rcg\/projects\/current-projects\/mirage\/#primaryimage","url":"https:\/\/www.isi.edu\/research-groups-rcg\/wp-content\/uploads\/sites\/17\/2022\/03\/mg_front.png","contentUrl":"https:\/\/www.isi.edu\/research-groups-rcg\/wp-content\/uploads\/sites\/17\/2022\/03\/mg_front.png","width":732,"height":600},{"@type":"BreadcrumbList","@id":"https:\/\/www.isi.edu\/research-groups-rcg\/projects\/current-projects\/mirage\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.isi.edu\/research-groups-rcg\/"},{"@type":"ListItem","position":2,"name":"Projects","item":"https:\/\/www.isi.edu\/research-groups-rcg\/projects\/"},{"@type":"ListItem","position":3,"name":"Current Projects","item":"https:\/\/www.isi.edu\/research-groups-rcg\/projects\/current-projects\/"},{"@type":"ListItem","position":4,"name":"Mirage: A Security Metrics Driven Obfuscation Design Environment"}]},{"@type":"WebSite","@id":"https:\/\/www.isi.edu\/research-groups-rcg\/#website","url":"https:\/\/www.isi.edu\/research-groups-rcg\/","name":"Reconfigurable Computing Group","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.isi.edu\/research-groups-rcg\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/www.isi.edu\/research-groups-rcg\/wp-json\/wp\/v2\/pages\/76","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.isi.edu\/research-groups-rcg\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.isi.edu\/research-groups-rcg\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.isi.edu\/research-groups-rcg\/wp-json\/wp\/v2\/users\/421"}],"replies":[{"embeddable":true,"href":"https:\/\/www.isi.edu\/research-groups-rcg\/wp-json\/wp\/v2\/comments?post=76"}],"version-history":[{"count":0,"href":"https:\/\/www.isi.edu\/research-groups-rcg\/wp-json\/wp\/v2\/pages\/76\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.isi.edu\/research-groups-rcg\/wp-json\/wp\/v2\/pages\/292"}],"wp:attachment":[{"href":"https:\/\/www.isi.edu\/research-groups-rcg\/wp-json\/wp\/v2\/media?parent=76"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}