Integrated Circuit (
IC)-based systems have been used in consumer and military electronics for several decades, enabling various devices, from smartphones to satellites. The continued technological advancements have also led to the adoption of IC-based systems in newer domains like the
Internet of Things (
IoT) and multi-cloud environments [
87]. In every domain, the demand for high-performance ICs is increasing. The reason behind this trend is the complexity of modern systems and the need for faster speeds to handle larger amounts of data being processed. As a result, the semiconductor industry is experiencing a surge in demand for products such as memory chips, microprocessors, and sensors. For example, the global IC market is forecast to grow from $489 billion in 2021 to $1.136 trillion in 2028 [
43]. ICs require advanced manufacturing processes and specialized equipment, which are only available in a limited number of foundries.
As the industry continues to evolve, the complexity of building and maintaining a foundry increases, resulting in skyrocketing costs. As an example, the estimated cost of building a 3 nm foundry is in the range of $15–20B [
83]. Thus, contemporary semiconductor vendors are increasingly adopting a
fabless model, where a globalized IC supply chain allows the production of high-performance ICs without the requirement of heavy investment in specialized foundry equipment.
The globalized IC supply chain enables design houses to have access to high-end semiconductor manufacturers [
80], but the exposure of the layout design to untrusted entities poses significant security threats as shown in Figure
1. Losses due to security threats could be severe, including service interruption, damage to public data integrity, monetary losses, and so on. For instance, the EU and the US warned about the dangers to national security that scammers exploited in the recent IC supply chain crunch [
5]. Similarly, the
International Telecommunication Union (
ITU) and the
European Union Intellectual Property Office (
EUIPO) reported in 2015 that 12.9% of the total sales of smartphones were lost due to counterfeit electronics. The sales of counterfeit devices in the market caused a loss of EUR 45.3 billion to legitimate industries—a significant monetary loss.
After the fabrication process, the bitstream, which contains the configuration information for the IC, is loaded to activate the obfuscated IC. This bitstream essentially instructs the IC on how to function and what tasks to perform. To ensure that the bitstream is securely stored and accessed, it needs to be stored in a secure storage medium, such as
non-volatile memory (
NVM) (e.g., flash memory and EEPROM). All these stages are vulnerable to security threats such as reverse engineering, overproduction, insertion of hardware Trojans, IP piracy, and counterfeiting [
65].
1.1 Security Threats
Reverse engineering is extensively demonstrated in the literature, as a method to extract the design and/or technology details of an IC with the help of tools and imaging techniques. It involves a complex process of removing the package of an IC, extracting all the layers, stitching the individual layers, and analyzing the obtained images to recover the netlist of a design [
95]. Reverse engineering also provides an opportunity for IP piracy and counterfeiting. Reverse engineering could be exploited with other techniques to extract secret information, i.e., cryptographic keys. Reverse engineering becomes more onerous and time-intensive after fabrication, packaging, or even deployment has occurred, but a skilled adversary can still perform it.
Overproduction occurs when a foundry produces more ICs than necessary or specified. Untrusted foundries may use such practices to sell ICs at lower prices in the grey or black market [
59]. This is possible because a foundry typically incurs only a marginal increase in costs when manufacturing additional ICs from the same masks [
59], i.e., the design house that owns the IP bears all the design-related NRE costs.
Hardware Trojans are modifications in the form of small and hard-to-detect logic for malicious purposes. Hardware Trojans are utilized to interrupt the service of an IC [
49] or to extract secret information [
70]. In the context of the layout, the footprint of the Trojan could be very small, which might become invisible to identify and test, especially when there is no reference (golden) design available to cross-verify the functionality. The source of the malicious logic could be a third-party IP, or it could also be mounted during manufacturing. As mentioned earlier, the foundry has complete access to the layout; therefore, it can easily identify potential locations for Trojan insertion [
70]. The Trojans/backdoors in third-party IPs may also contain hidden functionalities to expose restricted parts of the design and/or extract some secret information.
As mentioned earlier, the design process usually involves outsourcing third-party IPs (3PIPs). This may result in IP piracy when unlawfully obtained 3PIPs are used in designs. An unauthorized individual inside the foundry has the potential to steal information through reverse engineering or unlawfully sell the IPs without the authorization of the owner.
Counterfeiting refers to the fraudulent creation of ICs that are made to look almost identical to the original ICs. Counterfeit ICs are divided into seven different classes: recycled, remarked, overproduced, out-of-spec/defective, cloned, forged documentation, and tampered (See Figure
3 in [
38]). Recycled, remarked, out-of-spec/defective, and forged documentation are post-fabrication issues that appear when the counterfeit ICs deployed in a product are outsourced from non-authorized vendors or duplicate IC sellers. On the contrary, overproducing, cloning, and tampering are fabrication-time issues that could be completely tackled if (and only if) all the stages in Figure
1 were fully executed in a trusted environment.
Recalling again, the design house has to share the layout of the design thus it exposes all the minor details to untrusted foundries. Numerous techniques have been devised to counter these threats effectively. Countermeasure techniques to increase the IC security include Logic Locking [
45,
46,
47,
90,
100,
109,
111,
112], Camouflaging [
30,
60,
108], Split Manufacturing [
69,
74], and reconfigurable-based obfuscation techniques [
1,
2,
14,
17,
20,
25,
26,
29,
40,
53,
54,
55,
56,
58,
63,
64,
67,
68,
76,
81,
82,
84,
85,
93,
99,
107]. This process is evolving with time and there is a race to bring a novel technique that is resistant and practical [
36]. The aforementioned techniques aim at providing security against threats during IC fabrication. Some techniques also offer degrees of protection for post-fabrication attacks.
1.2 Reconfigurable-based Obfuscation vs. Logic Locking
Reconfigurable-based techniques typically draw inspiration from
field-programmable gate array (FPGA) devices, thus the title of this article. The research line of reconfigurable-based obfuscation is not new, but it has received far less attention than Logic Locking. Regarding the reconfigurable-based obfuscation techniques, one of the most formative works came from Microsoft and Iowa State University authors as described in [
17]; the authors appropriately identified that reconfigurable logic could be leveraged as an obfuscation asset. Subsequently, research studies utilized reconfigurable-based obfuscation schemes to protect digital designs. These techniques include a variety of reconfigurable elements, i.e.,
static random access memory (
SRAM)-LUTs [
17,
20,
25,
26,
29,
40,
56,
63,
64,
67,
82,
93], NVM-LUTs [
14,
53,
54,
55,
58,
99,
107], and other approaches
1 [
1,
2,
68,
76,
84].
The Logic Locking concept has existed for over a decade. Initially, Logic Locking techniques received more attention due to their practicality—inserting XOR/XNOR gates in a netlist can be easily scripted. In recent years, a cat-and-mouse game was established between developing and attacking Logic Locking techniques. Thus, Logic Locking has coincided with emerging powerful attacks that have compromised design security [
88]. This area of research has progressed rapidly, resulting in dozens of defense techniques and published attack strategies. Logic Locking and reconfigurable-based obfuscation techniques share a common objective of protecting IP against supply-chain attacks.
Recently, reconfigurable-based obfuscation has received more attention due to its high resiliency against attacks. However, this has raised questions about the security versus PPA tradeoffs. As a result, researchers have been proposing solutions where the reconfigurable part is as small as possible [
58]. Figure
2 illustrates the conceptual difference between the Logic locking approach, shown on the left, which involves adding key gates to the original design, and the reconfigurable-based obfuscation approach, shown on the right, which leverages reconfigurable logic elements. Logic Locking requires the correct configuration of the secret key, while reconfigurable-based obfuscation techniques rely on loading the correct bitstream. These approaches are somewhat analogous, so attacks from Logic Locking domain can also be applied to reconfigurable solutions.
In Logic Locking, the locking mechanism is embedded in the netlist of the design, so the design is locked behind the secret key. This procedure could subject the design to several attacks, e.g., identifying and removing the lock, tampering with the lock, or identifying the secret key, compromising the secured design. The adversary can access the entire design of the original IP combined with the key gates. On the other hand, a selected portion of the design is hidden in reconfigurable-based obfuscation, meaning that a portion of the design is exposed to the adversary. This technique does not reveal the entire design to the adversary and offers a higher potential for securing ICs against supply-chain attacks.
To implement Logic Locking, the designer makes simple modifications to the netlist and can then utilize the standard CAD design flow. On the other hand, reconfigurable-based obfuscation does not have a CAD tool flow and requires a custom tool to be incorporated into an existing flow, which includes logic synthesis, timing analysis, and optimization of a mixed ASIC and FPGA-like design [
67]. The right panel of Figure
2 shows an example of reconfigurable-based obfuscation, such as the eFPGA redaction technique. It employs custom tools that require significant effort to build. Reconfigurable-based obfuscation incurs higher security and overhead costs than Logic Locking, as shown by the arrows pointing to the right in Figure
2. Logic Locking techniques appear to be more mature and more readily available tools.
To ensure efficient usage of reconfigurable elements, it is important to consider the overheads of
power, performance, and area (
PPA). However, reconfigurable-based obfuscation techniques face various challenges throughout the design, testing, fabrication, and deployment stages. One such challenge is the placement of the SRAM for SRAM-based LUT implementation. Additionally, emerging technologies like
spin-transfer torque (
STT),
spin-orbit torque (
SOT), and
magnetic-random access memory (
MRAM) require specific considerations and capabilities during the fabrication process. These technologies pose operational challenges that can affect PPA overheads. To address these challenges, some designs adopt a
TRAnsistor-level Programming (
TRAP) fabric, which utilizes a transistor and switch box-based approach for providing obfuscation in the design, as described in [
84,
85].
Various reconfigurable-based techniques have the potential to ensure security against almost all hardware security threats. This is evident from the limited number of attacks on reconfigurable-based obfuscation. The attacks on these techniques either explore vulnerabilities or partially break the obfuscated circuit to recover the bitstream of the obfuscated design. Typically, the attacker first identifies the reconfigurable logic inside the obfuscated design for the purpose of the attack [
1,
28,
39,
78]. Reconfigurable-based obfuscation attacks can be subject to existing attacks like SAT attacks, brute force attacks, and removal attacks [
7,
15,
55,
62,
108].
Overall, this article is the first survey to focus on reconfigurable-based obfuscation techniques that combat security threats. We intend to present a detailed study of obfuscation trends, tradeoffs, and recent attacks. This work provides a comprehensive overview of the reconfigurable-based obfuscation landscape, classifying the techniques based on three important factors: technology used, element type, and IP type. The efficiency of these techniques is evaluated and compared in terms of PPA overheads. We discuss comparing attacks on reconfigurable-based obfuscation and the challenges of evaluating obfuscation on hardware.
The structure of this article is given as follows: Section
2.1 classifies the reconfigurable-based obfuscation techniques and provides in-depth explanations. Section
3 elaborates on the comparison and analysis between numerous reconfigurable-based obfuscation techniques. Then, a comprehensive study of attacks and their evaluation of various obfuscation techniques is given in Section
4. In Section
5, a rich discussion is provided as well as a comparison to Logic Locking. Section
5 also discusses future trends and challenges. Finally, we conclude this article in Section
6.