NOTICE: Due to a lapse in annual appropriations, most of this website is not being updated. Learn more.
Form submissions will still be accepted but will not receive responses at this time. Sections of this site for programs using non-appropriated funds (such as NVLAP) or those that are excepted from the shutdown (such as CHIPS and NVD) will continue to be updated.
An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
We develop a novel post-synthesis obfuscation technique, POTENT, to protect NoC fabrics against reverse engineering attacks. POTENT integrates programmable switches at NoC routers, concealing topology and communication paths under a dynamically controlled key to make the design resilient to reverse-engineering attempts. By targeting post-synthesis gate-level netlist, POTENT overcomes challenges induced by logic optimization that can render pre-synthesis (RTL-level) NoC obfuscations vulnerable to SAT attacks. We extensively evaluate POTENT to demonstrate its robustness to SAT attacks. Finally, our experiments show that POTENT incurs minimal overhead on area, power, and performance.
Proceedings Title
2024 IEEE 37th International System-on-Chip Conference (SOCC)
Amberiadis, K.
, Halder, D.
, Ray, S.
, Liu, Y.
and Srivastava, A.
(2024),
POTENT: Post-Synthesis Obfuscation for Secure Network-on-Chip Architectures, 2024 IEEE 37th International System-on-Chip Conference (SOCC), Dresden, DE, [online], https://doi.org/10.1109/SOCC62300.2024.10737820, https://tsapps.nist.gov/publication/get_pdf.cfm?pub_id=957934
(Accessed October 16, 2025)