[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
research-article

Fault Analysis-Based Logic Encryption

Published: 01 February 2015 Publication History

Abstract

Globalization of the integrated circuit (IC) design industry is making it easy for rogue elements in the supply chain to pirate ICs, overbuild ICs, and insert hardware Trojans. Due to supply chain attacks, the IC industry is losing approximately $4 billion annually. One way to protect ICs from these attacks is to encrypt the design by inserting additional gates such that correct outputs are produced only when specific inputs are applied to these gates. The state-of-the-art logic encryption technique inserts gates randomly into the design, but does not necessarily ensure that wrong keys corrupt the outputs. Our technique ensures that wrong keys corrupt the outputs. We relate logic encryption to fault propagation analysis in IC testing and develop a fault analysis-based logic encryption technique. This technique enables a designer to controllably corrupt the outputs. Specifically, to maximize the ambiguity for an attacker, this technique targets 50% Hamming distance between the correct and wrong outputs (ideal case) when a wrong key is applied. Furthermore, this 50% Hamming distance target is achieved using a smaller number of additional gates when compared to random logic encryption.

References

[1]
KPMG, 2006, Managing the risks of counterfeiting in the information technology, [Online]. Available: www.agmaglobal.org/press_events/press_docs/Counterfeit_WhitePaper_Final.pdf.
[2]
SEMI, 2008, Innovation is at risk as semiconductor equipment and materials industry loses up to $4 billion annually due to IP infringement, [Online]. Available: www.semi.org/en/Press/P043775.
[3]
Y. M. Alkabani and F. Koushanfar, “Active hardware metering for intellectual property protection and security”, in Proc. USENIX Secur., pp. 291–306, 2007.
[4]
Department of Defense, 2005, Defense Science Board (DSB) study on High Performance Microchip Supply, [Online]. Available: http://www.aoq.osd.mil/dsb/reports/ADA435563.pdf.
[5]
W. P. Griffin, A. Raghunathan, and K. Roy, “CLIP: Circuit level IC protection through direct injection of process variations”, in IEEE Trans. Very Large Scale Integr. Syst., vol. 20, no. 5, pp. 791–803, 2012.
[6]
J. A. Roy, F. Koushanfar, and I. L. Markov, “EPIC: Ending piracy of integrated circuits”, in Proc. Des. Autom. Test Eur., pp. 1069–1074, 2008.
[7]
J. A. Roy, F. Koushanfar, and I. L. Markov, “Ending piracy of integrated circuits”, in Computer, vol. 43, no. 10, pp. 30–38, 2010.
[8]
A. Baumgarten, A. Tyagi, and J. Zambreno, “Preventing IC piracy using reconfigurable logic barriers”, in IEEE Des. Test Comput., vol. 27, no. 1, pp. 66–75, 2010.
[9]
J. Rajendran, Y. Pino, O. Sinanoglu, and R. Karri, “Security analysis of logic obfuscation,” in Proc. Des. Autom. Conf., 2012, pp. 83–89.
[10]
H. K. Lee and D. S. Ha, “HOPE: An efficient parallel fault simulator for synchronous sequential circuits”, in IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., vol. 15, no. 9, pp. 1048–1058, 1996.
[11]
R. S. Chakraborty and S. Bhunia, “HARPOON: An obfuscation-based SoC design methodology for hardware protection”, in IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., vol. 28, no. 10, pp. 1493–1502, 2009.
[12]
R. S. Chakraborty and S. Bhunia, “Security against hardware Trojan through a novel application of design obfuscation,” in Proc. IEEE Int. Conf. Comput. Aided Des., 2009, pp. 113–116.
[13]
A. B. Kahng, J. Lach, W. H. Mangione-Smith, S. Mantik, I. L. Markov, M. Potkonjak, P. Tucker, H. Wang, and G. Wolfe, “Watermarking techniques for intellectual property protection,” in Proc. IEEE/ACM Des. Autom. Conf., 1998, pp. 776–781.
[14]
F. Koushanfar, I. Hong, and M. Potkonjak, “Behavioral synthesis techniques for intellectual property protection”, in ACM Trans. Des. Autom. Electron. Syst., vol. 10, no. 3, pp. 523–545, 2005.
[15]
A. B. Kahng, S. Mantik, I. L. Markov, M. Potkonjak, P. Tucker, H. Wang, and G. Wolfe, “Robust IP watermarking methodologies for physical design,” in Proc. Des. Autom. Conf., 1998, pp. 782–787.
[16]
Specification for the Advanced Encryption Standard (AES) Federal Information Processing Standards Publication 197, 2001.
[17]
G. E. Suh and S. Devadas, “Physical unclonable functions for device authentication and secret key generation,” in Proc. IEEE/ACM Des. Autom. Conf., 2007, pp. 9–14.
[18]
J. W. Lee et al., “A technique to build a secret key in integrated circuits for identification and authentication applications,” in Proc Symp. VLSI Circuits, 2004, pp. 176–179.
[19]
K. Lofstrom, W. R. Daasch, and D. Taylor, “IC identification circuit using device mismatch,” in Proc. IEEE Int. Solid-State Circuits Conf., 2000, pp. 372–373.
[20]
M. Bushnell and V. Agarwal, Essentials of Electronic Testing for Digital, Memory, and Mixed-Signal VLSI Circuits, Boston, MA USA: Kluwer, 2000.
[21]
H. M. Heys and S. E. Tavares, “Avalanche characteristics of substitution-permutation encryption networks”, in IEEE Trans. Comput., vol. 44, no. 9, pp. 1131–1139, 1995.
[22]
P. Kocher, J. Jaffe, and B. Jun, “Differential power analysis,” in Proc. Crypto, 1999, pp. 388–397.
[23]
K. Tiri and I. Verbauwhede, “A logic level design methodology for a secure DPA resistant ASIC or FPGA implementation,” in Proc. Des. Autom. Test Eur., 2004, pp. 246–251.
[24]
D. M. Harris and S. L. Harris, Digital Design and Computer Architecture, San Mateo, CA USA: Morgan Kaufmann, 2013.
[25]
B. Barak, O. Goldreich, R. Impagliazzo, S. Rudich, A. Sahai, S. Vadhan, and K. Yang, “On the (im)possibility of obfuscating programs”, in J. ACM, vol. 2, no. 6, pp. 1–48, 2012.
[26]
Sun Microsystems, 2006, OpenSPARC T1 processor, [Online]. Available: http://www.opensparc.net/opensparc-t1/index.html.
[27]
J. Rajendran, A. K. Kanuparthi, M. Zahran, S. K. Adepalli, G. Ormazabal, and R. Karri, “Securing processors against insider attacks: A circuit-microarchitecture co-design approach”, in IEEE Des. Test Mag., vol. 30, no. 2, pp. 35–44, 2013.
[28]
ARM, 2010, i.MX35 applications processors for industrial and consumer products, [Online]. Available: http://www.freescale.com/webapp/sps/site/prod_summary.jsp?code=i.MX357&fpsp=1&tab=Documentation_Tab.

Cited By

View all
  • (2024)Removal of SAT-Hard Instances in Logic Obfuscation Through Inference of FunctionalityACM Transactions on Design Automation of Electronic Systems10.1145/367490329:4(1-23)Online publication date: 25-Jun-2024
  • (2024)SeeMLess: Security Evaluation of Logic Locking using Machine Learning oriented EstimationProceedings of the Great Lakes Symposium on VLSI 202410.1145/3649476.3660382(489-494)Online publication date: 12-Jun-2024
  • (2024)Boolean Domain Attack on Corrupt and Correct Based Logic Locking TechniquesProceedings of the Great Lakes Symposium on VLSI 202410.1145/3649476.3658710(415-420)Online publication date: 12-Jun-2024
  • Show More Cited By

Index Terms

  1. Fault Analysis-Based Logic Encryption
          Index terms have been assigned to the content through auto-classification.

          Recommendations

          Comments

          Please enable JavaScript to view thecomments powered by Disqus.

          Information & Contributors

          Information

          Published In

          cover image IEEE Transactions on Computers
          IEEE Transactions on Computers  Volume 64, Issue 2
          Feb. 2015
          297 pages

          Publisher

          IEEE Computer Society

          United States

          Publication History

          Published: 01 February 2015

          Qualifiers

          • Research-article

          Contributors

          Other Metrics

          Bibliometrics & Citations

          Bibliometrics

          Article Metrics

          • Downloads (Last 12 months)0
          • Downloads (Last 6 weeks)0
          Reflects downloads up to 19 Dec 2024

          Other Metrics

          Citations

          Cited By

          View all
          • (2024)Removal of SAT-Hard Instances in Logic Obfuscation Through Inference of FunctionalityACM Transactions on Design Automation of Electronic Systems10.1145/367490329:4(1-23)Online publication date: 25-Jun-2024
          • (2024)SeeMLess: Security Evaluation of Logic Locking using Machine Learning oriented EstimationProceedings of the Great Lakes Symposium on VLSI 202410.1145/3649476.3660382(489-494)Online publication date: 12-Jun-2024
          • (2024)Boolean Domain Attack on Corrupt and Correct Based Logic Locking TechniquesProceedings of the Great Lakes Symposium on VLSI 202410.1145/3649476.3658710(415-420)Online publication date: 12-Jun-2024
          • (2024)ALT-Lock: Logic and Timing Ambiguity-Based IP Obfuscation Against Reverse EngineeringIEEE Transactions on Very Large Scale Integration (VLSI) Systems10.1109/TVLSI.2024.341103332:8(1535-1548)Online publication date: 1-Aug-2024
          • (2024)GateLock: Input-Dependent Key-Based Locked Gates for SAT Resistant Logic LockingIEEE Transactions on Very Large Scale Integration (VLSI) Systems10.1109/TVLSI.2023.334035032:2(361-371)Online publication date: 1-Feb-2024
          • (2024)Improving Bounded Model Checkers Scalability for Circuit De-Obfuscation: An ExplorationIEEE Transactions on Information Forensics and Security10.1109/TIFS.2024.335728619(2771-2785)Online publication date: 1-Jan-2024
          • (2024)STATION: State Encoding-Based Attack-Resilient Sequential ObfuscationIEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems10.1109/TCAD.2024.338787343:10(2888-2901)Online publication date: 1-Oct-2024
          • (2024)Logic Locking over TFHE for Securing User Data and AlgorithmsProceedings of the 29th Asia and South Pacific Design Automation Conference10.1109/ASP-DAC58780.2024.10473831(600-605)Online publication date: 22-Jan-2024
          • (2023)Metrics-to-Methods: Decisive Reverse Engineering Metrics for Resilient Logic LockingProceedings of the Great Lakes Symposium on VLSI 202310.1145/3583781.3590273(685-690)Online publication date: 5-Jun-2023
          • (2023)A Survey and Perspective on Artificial Intelligence for Security-Aware Electronic Design AutomationACM Transactions on Design Automation of Electronic Systems10.1145/356339128:2(1-57)Online publication date: 6-Mar-2023
          • Show More Cited By

          View Options

          View options

          Media

          Figures

          Other

          Tables

          Share

          Share

          Share this Publication link

          Share on social media