- Microscopic photos of brand handbag textures & parts to authenticate
- Integrated circuits can be depackaged & delayered to gain information that is intended to be private
- Potential solution: Camouflaging. Dummy contacts camouflage Boolean functionality.
(Pictured circuit could implement XAND/NAND or NOR but reverser couldn’t determine.)
- Camouflaging has a per-gate cost.
- Small # of judicioously selected gates is camouflaged, attacker needs > 1000s of years to decamouflage.