194 results on '"Hardware obfuscation"'
Search Results
2. ReTrustFSM: Toward RTL Hardware Obfuscation-A Hybrid FSM Approach
- Author
-
M. Sazadur Rahman, Rui Guo, Hadi M. Kamali, Fahim Rahman, Farimah Farahmandi, and Mark Tehranipoor
- Subjects
Hardware obfuscation ,logic locking ,FSM ,RTL ,structural analysis ,BMC ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 - Abstract
Hardware obfuscating is a proactive design-for-trust technique against IC supply chain threats, i.e., IP piracy and overproduction. Many studies have evaluated numerous techniques for obfuscation purposes. Nevertheless, de-obfuscation attacks have demonstrated their insufficiency. This paper proposes a register-transfer (RT) level finite-state-machine (FSM) obfuscation technique called ReTrustFSM that allows designers to obfuscate at the earliest possible stage. ReTrustFSM combines three types of secrecy: explicit external secrecy via an external key, implicit external secrecy based on specific clock cycles, and internal secrecy through a concealed FSM transition function. So, the robustness of ReTrustFSM relies on the external key, the external primary input patterns, and the cycle accuracy of applying such external stimuli. Additionally, ReTrustFSM defines a cohesive relationship between the features of Boolean problems and the required time for de-obfuscation, ensuring a maximum execution time for oracle-guided de-obfuscation attacks. Various attacks are employed to test ReTrustFSM’s robustness, including structural and machine learning attacks, functional I/O queries (BMC), and FSM attacks. We have also analyzed the corruptibility and overhead of design-under-obfuscation. Our experimental results demonstrate the robustness of ReTrustFSM at acceptable overhead/corruption while resisting such threat models.
- Published
- 2023
- Full Text
- View/download PDF
3. Protecting the Intellectual Property of Binary Deep Neural Networks With Efficient Spintronic-Based Hardware Obfuscation.
- Author
-
Alireza Mohseni, Mohammad Hossein Moaiyeri, Abdolah Amirany, and Mohammad Hadi Rezayati
- Published
- 2024
- Full Text
- View/download PDF
4. Hardware Obfuscation of AES IP Core Using PUFs and PRNG: A Secure Cryptographic Key Generation Solution for Internet-of-Things Applications
- Author
-
Chhabra, Surbhi and Lata, Kusum
- Published
- 2022
- Full Text
- View/download PDF
5. Titan: Security Analysis of Large-Scale Hardware Obfuscation Using Graph Neural Networks.
- Author
-
Likhitha Mankali, Lilas Alrahis, Satwik Patnaik, Johann Knechtel, and Ozgur Sinanoglu
- Published
- 2023
- Full Text
- View/download PDF
6. Hardware Obfuscation Based Watermarking Technique for IPR Ownership Identification.
- Author
-
Priyanka Bagul and Vandana Inamdar
- Published
- 2023
- Full Text
- View/download PDF
7. Development and Evaluation of Hardware Obfuscation Benchmarks
- Author
-
Amir, Sarah, Shakya, Bicky, Xu, Xiaolin, Jin, Yier, Bhunia, Swarup, Tehranipoor, Mark, and Forte, Domenic
- Published
- 2018
- Full Text
- View/download PDF
8. Preventing DNN Model IP Theft via Hardware Obfuscation.
- Author
-
Brunno F. Goldstein, Vinay C. Patil, Victor da Cruz Ferreira, Alexandre Solon Nery, Felipe M. G. França, and Sandip Kundu
- Published
- 2021
- Full Text
- View/download PDF
9. Hardware Obfuscation of Digital FIR Filters.
- Author
-
Levent Aksoy, Alexander Hepp, Johanna Baehr 0001, and Samuel Pagliarini
- Published
- 2022
10. Towards the enhancement of AES IP security using hardware obfuscation technique: A practical approach for secure data transmission in IoT.
- Author
-
Surbhi Chhabra and Kusum Lata 0001
- Published
- 2022
- Full Text
- View/download PDF
11. Hardware obfuscation of AES IP core using combinational hardware Trojan circuit for secure data transmission in IoT applications.
- Author
-
Surbhi Chhabra and Kusum Lata 0001
- Published
- 2022
- Full Text
- View/download PDF
12. On the Difficulty of FSM-based Hardware Obfuscation
- Author
-
Marc Fyrbiak, Sebastian Wallat, Jonathan Déchelotte, Nils Albartus, Sinan Böcker, Russell Tessier, and Christof Paar
- Subjects
Hardware Reverse Engineering ,Hardware Obfuscation ,Hardware Nanomites ,FSM-based Hardware Obfuscation ,Computer engineering. Computer hardware ,TK7885-7895 ,Information technology ,T58.5-58.64 - Abstract
In today’s Integrated Circuit (IC) production chains, a designer’s valuable Intellectual Property (IP) is transparent to diverse stakeholders and thus inevitably prone to piracy. To protect against this threat, numerous defenses based on the obfuscation of a circuit’s control path, i.e. Finite State Machine (FSM), have been proposed and are commonly believed to be secure. However, the security of these sequential obfuscation schemes is doubtful since realistic capabilities of reverse engineering and subsequent manipulation are commonly neglected in the security analysis. The contribution of our work is threefold: First, we demonstrate how high-level control path information can be automatically extracted from third-party, gate-level netlists. To this end, we extend state-of-the-art reverse engineering algorithms to deal with Field Programmable Gate Array (FPGA) gate-level netlists equipped with FSM obfuscation. Second, on the basis of realistic reverse engineering capabilities we carefully review the security of state-of-the-art FSM obfuscation schemes. We reveal several generic strategies that bypass allegedly secure FSM obfuscation schemes and we practically demonstrate our attacks for a several of hardware designs, including cryptographic IP cores. Third, we present the design and implementation of Hardware Nanomites, a novel obfuscation scheme based on partial dynamic reconfiguration that generically mitigates existing algorithmic reverse engineering.
- Published
- 2018
- Full Text
- View/download PDF
13. Hardware Obfuscation and Logic Locking: A Tutorial Introduction.
- Author
-
Tamzidul Hoque, Rajat Subhra Chakraborty, and Swarup Bhunia
- Published
- 2020
- Full Text
- View/download PDF
14. On the Construction of Composite Finite Fields for Hardware Obfuscation.
- Author
-
Xinmiao Zhang 0001 and Yingjie Lao
- Published
- 2019
- Full Text
- View/download PDF
15. A Resource-Efficient Binary CNN Implementation for Enabling Contactless IoT Authentication
- Author
-
Hasan, Mahmudul, Hoque, Tamzidul, Ganji, Fatemeh, Woodard, Damon, Forte, Domenic, and Shomaji, Sumaiya
- Published
- 2024
- Full Text
- View/download PDF
16. Key Generation for Hardware Obfuscation Using Strong PUFs
- Author
-
Md Shahed Enamul Quadir and John A. Chandy
- Subjects
obfuscation ,key generation ,authentication ,physically unclonable function ,counterfeiting ,Technology - Abstract
As a result of the increased use of contract foundries, intellectual property (IP) theft, excess production and reverse engineering are major concerns for the electronics and defense industries. Hardware obfuscation and IP locking can be used to make a design secure by replacing a part of the circuit with a key-locked module. In order to ensure each chip has unique keys, previous work has proposed using physical unclonable functions (PUF) to lock the circuit. However, these designs are area intensive. In this work, we propose a strong PUF-based hardware obfuscation scheme to uniquely lock each chip.
- Published
- 2019
- Full Text
- View/download PDF
17. SAIL: Machine Learning Guided Structural Analysis Attack on Hardware Obfuscation.
- Author
-
Prabuddha Chakraborty, Jonathan Cruz 0001, and Swarup Bhunia
- Published
- 2018
18. Hardware Obfuscation Based Watermarking Technique for IPR Ownership Identification.
- Author
-
Bagul, Priyanka and Inamdar, Vandana
- Subjects
DIGITAL watermarking ,WATERMARKS ,INTELLECTUAL property ,SEMICONDUCTOR industry - Abstract
As the reuse of IP cores or the development of frequently used hardware modules is gaining more attention in the semiconductor industry, the misappropriation of the owner's identity is a rising concern. Therefore, imprinting the owner's identity in the form of a watermark or signature on the IP core is essential to avoid intellectual property right (IPR) infringement. In view of this, a watermarking technique is proposed in the present manuscript. A constraint-based dynamic watermarking method to generate the owner's signature is proposed in conjunction with the logic encryption-based hardware obfuscation method. The method formulated in this manuscript consciously makes use of a basic switching component for embedding a watermark with IP core and hardware obfuscation, to achieve a lower overhead budget. Through the switching mechanism, the embedded watermark can be made detectable to legitimate end users off chip via test pin. The logic encryption-based method is set for accessing the watermark. Furthermore, an encrypted functionality is set as the signature generator module for generating owner's signature. This provides hardware obfuscation and two-stage authentication mechanism for the generation of owner's signature, and as a result of this, double-layer protection is achieved. Furthermore, a novel method to configure input key for signature generation module and to formulate owner's signature is proposed. The viability of the present watermark technique for real-life application is checked on the ground of transparency, security, reliability, performance overhead, and robustness. Since the watermark in the proposed method is embedded outside the IP core, it does not cause any latency for the IP core functionality. Thus, even with significantly lower area overhead (∼<1.4%), the proposed method is able to provide higher robustness in terms of lower probability of coincidence (P
C = 4.68 e − 97). [ABSTRACT FROM AUTHOR]- Published
- 2023
- Full Text
- View/download PDF
19. On the Difficulty of FSM-based Hardware Obfuscation.
- Author
-
Marc Fyrbiak, Sebastian Wallat, Jonathan Déchelotte, Nils Albartus, Sinan Böcker, Russell Tessier, and Christof Paar
- Published
- 2019
20. Blockchain-enabled Cryptographically-secure Hardware Obfuscation.
- Author
-
Fatemeh Ganji, Shahin Tajik, Domenic Forte, and Jean-Pierre Seifert
- Published
- 2019
21. Towards the enhancement of AES IP security using hardware obfuscation technique: A practical approach for secure data transmission in IoT.
- Author
-
Chhabra, Surbhi and Lata, Kusum
- Abstract
The global market of developing Internet of Things (IoT) devices increases rapidly with improved design goals like cost, energy efficiency, and performance. Unfortunately, the above design goals often come at the expense of security. Illegal access to the network, malicious device control, compromised sensitive information, and theft of personal data are main threats to these devices. As a result, the Advanced Encryption Standard (AES) is sometimes employed to ensure safe transmission and processing of data in IoT Systems. However, tampering, cloning, and reverse engineering are main concerns that impair the computational complexity of the 128‐bit AES at the hardware level. Recently hardware obfuscation‐based AES has emerged as a comprehensive hardware security approach for reducing threat impacts. The hardware obfuscation schemes efficiently introduce obfuscation keys for AES to conceal its functionality. The Xilinx Vivado 2016.2 software and BASYS‐3 FPGA have been used to implement obfuscated AES approaches in this work. The proposed methods have low resource usage in terms of area and power overhead while providing a high level of security in terms of Hamming Distance of 50% and Avalanche Effect of 40% for each obfuscation method. We have also analyzed the probability of success for brute‐force attacks for proposed methodologies. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
22. Hardware obfuscation of AES IP core using combinational hardware Trojan circuit for secure data transmission in IoT applications.
- Author
-
Chhabra, Surbhi and Lata, Kusum
- Subjects
DATA transmission systems ,COMBINATIONAL circuits ,SYSTEMS on a chip ,ADVANCED Encryption Standard ,HAMMING distance ,INTERNET of things ,REVERSE engineering ,SEMICONDUCTOR industry - Abstract
Summary: In semiconductor industry, reusability‐based System‐on‐Chip architecture using hardware intellectual property (IP) cores play a prominent role in Internet‐of‐Things (IoT) applications for secure data transmission. The advent of IoT makes it possible for physical things to transmit, process, compute, and receive data over internet. But, it also introduces in‐device communication security vulnerabilities. Advanced Encryption Standard (AES) IP has been used to address security vulnerabilities in IoT. It is an efficient and high‐performance crypto algorithm used in IoT devices for secure and fast data encryption. However, due to rise of many attacks, the security of AES IP is also under threat. Hardware obfuscation is one such prominent countermeasure that mitigates hardware attacks such as tampering, reverse engineering, and malicious alteration. This article presents secure AES IP mechanism using the potential technique of obfuscation inspired by the concept of combinational hardware Trojan. Experimental results show that the proposed technique is resilient against reverse‐engineering, malicious alteration, Boolean satisfiability attack, and key‐sensitizing attacks. The confusion and diffusion features of obfuscated AES IP are higher in terms of Hamming distance, avalanche effect, and balance rate. The proposed technique is implemented in Basys‐3 FPGAs within 5% of power and area overhead while maintaining high throughput. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
23. BLOcKeR: A Biometric Locking Paradigm for IoT and the Connected Person
- Author
-
Shomaji, Sumaiya, Guo, Zimu, Ganji, Fatemeh, Karimian, Nima, Woodard, Damon, and Forte, Domenic
- Published
- 2021
- Full Text
- View/download PDF
24. Obfuscated AES cryptosystem for secure medical imaging systems in IoMT edge devices
- Author
-
Chhabra, Surbhi and Lata, Kusum
- Published
- 2022
- Full Text
- View/download PDF
25. On the Construction of Composite Finite Fields for Hardware Obfuscation.
- Author
-
Zhang, Xinmiao and Lao, Yingjie
- Subjects
FINITE fields ,COMPOSITE construction - Abstract
Hardware obfuscation is a technique that modifies the circuit to hide the functionality. Obfuscations through algorithmic modifications add protection in addition to circuit-level techniques, and their effects on the data paths can be analyzed and controlled at the architectural level. Many error-correcting coding and cryptography algorithms are based on finite field arithmetic. For the first time, this paper proposes a hardware obfuscation scheme achieved through varying finite field constructions and primitive element representations. Also the variations are effectively transformed to bit permuters controlled by obfuscation keys to achieve high level of security with very small complexity overheads. To illustrate the effectiveness, the proposed scheme is applied to obfuscate Reed-Solomon decoders, which are broadly used in communication and storage systems. For a (255, 239) RS decoder over finite field $GF(256)$GF(256), the proposed scheme achieves 1239 bits of independent obfuscation key with 4.4 percent area overhead, while yielding no penalty on the throughput and only one extra clock cycle of latency. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
26. LifeLine for FPGA Protection: Obfuscated Cryptography for Real-World Security
- Author
-
Florian Stolz, Nils Albartus, Julian Speith, Simon Klix, Clemens Nasenberg, Aiden Gula, Marc Fyrbiak, Christof Paar, Tim Güneysu, and Russell Tessier
- Subjects
FPGA Security ,Hardware Obfuscation ,Software Obfuscation ,Reverse Engineering ,Computer engineering. Computer hardware ,TK7885-7895 ,Information technology ,T58.5-58.64 - Abstract
Over the last decade attacks have repetitively demonstrated that bitstream protection for SRAM-based FPGAs is a persistent problem without a satisfying solution in practice. Hence, real-world hardware designs are prone to intellectual property infringement and malicious manipulation as they are not adequately protected against reverse-engineering. In this work, we first review state-of-the-art solutions from industry and academia and demonstrate their ineffectiveness with respect to reverse-engineering and design manipulation. We then describe the design and implementation of novel hardware obfuscation primitives based on the intrinsic structure of FPGAs. Based on our primitives, we design and implement LifeLine, a hardware design protection mechanism for FPGAs using hardware/software co-obfuscated cryptography. We show that LifeLine offers effective protection for a real-world adversary model, requires minimal integration effort for hardware designers, and retrofits to already deployed (and so far vulnerable) systems.
- Published
- 2021
- Full Text
- View/download PDF
27. A Novel Probability-Based Logic-Locking Technique: ProbLock
- Author
-
Michael Yue and Sara Tehranipoor
- Subjects
hardware security ,logic locking ,hardware obfuscation ,Chemical technology ,TP1-1185 - Abstract
Integrated circuit (IC) piracy and overproduction are serious issues that threaten the security and integrity of a system. Logic locking is a type of hardware obfuscation technique where additional key gates are inserted into the circuit. Only the correct key can unlock the functionality of that circuit; otherwise, the system produces the wrong output. In an effort to hinder these threats on ICs, we have developed a probability-based logic-locking technique to protect the design of a circuit. Our proposed technique, called “ProbLock”, can be applied to both combinational and sequential circuits through a critical selection process. We used a filtering process to select the best location of key gates based on various constraints. Each step in the filtering process generates a subset of nodes for each constraint. We also analyzed the correlation between each constraint and adjusted the strength of the constraints before inserting key gates. We tested our algorithm on 40 benchmarks from the ISCAS ’85 and ISCAS ’89 suites. We evaluated ProbLock against a SAT attack and measured how long the attack took to successfully generate a key value. The SAT attack took longer for most benchmarks using ProbLock which proves viable security in hardware obfuscation.
- Published
- 2021
- Full Text
- View/download PDF
28. Doppelganger Obfuscation — Exploring theDefensive and Offensive Aspects of Hardware Camouflaging
- Author
-
Max Hoffmann and Christof Paar
- Subjects
Hardware Obfuscation ,Camouflaging ,Hardware Trojans ,Computer engineering. Computer hardware ,TK7885-7895 ,Information technology ,T58.5-58.64 - Abstract
Hardware obfuscation is widely used in practice to counteract reverse engineering. In recent years, low-level obfuscation via camouflaged gates has been increasingly discussed in the scientific community and industry. In contrast to classical high-level obfuscation, such gates result in recovery of an erroneous netlist. This technology has so far been regarded as a purely defensive tool. We show that low-level obfuscation is in fact a double-edged sword that can also enable stealthy malicious functionalities. In this work, we present Doppelganger, the first generic design-level obfuscation technique that is based on low-level camouflaging. Doppelganger obstructs central control modules of digital designs, e.g., Finite State Machines (FSMs) or bus controllers, resulting in two different design functionalities: an apparent one that is recovered during reverse engineering and the actual one that is executed during operation. Notably, both functionalities are under the designer’s control. In two case studies, we apply Doppelganger to a universal cryptographic coprocessor. First, we show the defensive capabilities by presenting the reverse engineer with a different mode of operation than the one that is actually executed. Then, for the first time, we demonstrate the considerable threat potential of low-level obfuscation. We show how an invisible, remotely exploitable key-leakage Trojan can be injected into the same cryptographic coprocessor just through obfuscation. In both applications of Doppelganger, the resulting design size is indistinguishable from that of an unobfuscated design, depending on the choice of encodings.
- Published
- 2020
- Full Text
- View/download PDF
29. A Low Cost MST-FSM Obfuscation Method for Hardware IP Protection.
- Author
-
Zhang, Yuejun, Pan, Zhao, Wang, Pengjun, and Zhang, Xiaowei
- Subjects
- *
FINITE state machines , *HAMMING distance , *SPANNING trees , *ENCRYPTION protocols , *ALGORITHMS - Abstract
Effective resistance to intellectual property (IP) piracy, overproduction and reverse engineering are becoming more and more necessary in the integrated circuit (IC) supply chain. To protect the hardware, the obfuscation methodology hides the original function by adding a large number of redundant states. However, existing hardware obfuscation approaches have hardware overhead and efficiency of obfuscation limitations. This paper proposed a novel methodology for IP security using the minimum spanning tree finite state machine (MST-FSM) obfuscation. In the minimum spanning tree (MST) algorithm, the Hamming distance defines the cost of obfuscated states. The Kruskal algorithm optimizes the connection relationship of obfuscated states by computing the Hamming distance of the MST-FSM. The proposed MST-FSM is automatically generated and embedded in the hardware IP with the self-building program. Finally, the MST-FSM is applied on the itc99 benchmark circuits and encryption standard IP cores. Compared with other state-of-the-arts, the obfuscation potency is improved by 3.57%, and the average hardware cost is decreased by about 6.01%. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
30. Tunnel FET‐based ultralow‐power and hardware‐secure circuit design considering p‐i‐n forward leakage.
- Author
-
Japa, Aditya, Majumder, Manoj Kumar, Sahoo, Subhendu K., and Vaddi, Ramesh
- Subjects
- *
TUNNEL field-effect transistors , *RANDOM number generators , *ELECTRIC circuit design & construction , *LEAKAGE , *DIGITAL electronics , *FIELD-effect transistors - Abstract
Summary: Tunnel field‐effect transistor (TFET) exhibits significant p‐i‐n forward leakage with the increase in drain‐to‐source voltage bias, and this adversely impacts the power consumption and reliability of TFET digital circuits. This work presents low‐power circuit techniques that result in novel compact gates and recommends tristate gates to mitigate the leakage effects. The proposed novel compact gates and tristate gates demonstrate two and six times lower power consumption compared with conventional TFET transmission gates with enhanced reliability. Further, this work introduces a new design methodology that leverages TFET p‐i‐n forward leakage for hardware obfuscation applications. Utilizing the proposed design methodology, the optimization of 40% and 80% in area and power consumption of hardware security primitives like true random number generators is also accomplished. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
31. Survey of Security Issues in Memristor-Based Machine Learning Accelerators for RF Analysis.
- Author
-
Lillis, Will, Hoffing, Max Cohen, and Burleson, Wayne
- Subjects
MEMRISTORS ,MACHINE learning ,RADIO frequency ,SUPPLY chains ,CRYPTOGRAPHY - Abstract
We explore security aspects of a new computing paradigm that combines novel memristors and traditional Complimentary Metal Oxide Semiconductor (CMOS) to construct a highly efficient analog and/or digital fabric that is especially well-suited to Machine Learning (ML) inference processors for Radio Frequency (RF) signals. Analog and/or hybrid hardware designed for such application areas follows different constraints from that of traditional CMOS. This paradigm shift allows for enhanced capabilities but also introduces novel attack surfaces. Memristors have different properties than traditional CMOS which can potentially be exploited by attackers. In addition, the mixed signal approximate computing model has different vulnerabilities than traditional digital implementations. However both the memristor and the ML computation can be leveraged to create security mechanisms and countermeasures ranging from lightweight cryptography, identifiers (e.g., Physically Unclonable Functions (PUFs), fingerprints, and watermarks), entropy sources, hardware obfuscation and leakage/attack detection methods. Three different threat models are proposed: (1) Supply Chain, (2) Physical Attacks, and (3) Remote Attacks. For each threat model, potential vulnerabilities and defenses are identified. This survey reviews a variety of recent work from the hardware and ML security literature and proposes open problems for both attack and defense. The survey emphasizes the growing area of RF signal analysis and identification in terms of commercial space, as well as military applications and threat models. We differ from other recent surveys that target ML, in general, neglecting RF applications. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
32. A New Optimal Method for the Secure Design of Combinational Circuits against Hardware Trojans Using Interference Logic Locking.
- Author
-
Mirmohammadi, Zahra and Etemadi Borujeni, Shahram
- Subjects
COMBINATIONAL circuits ,INTELLECTUAL property theft ,HAMMING distance ,REVERSE engineering ,INTEGRATED circuits ,LOGIC - Abstract
Effective resistance to intellectual property theft, reverse engineering, and hardware Trojan insertion in integrated circuit supply chains is increasingly essential, for which many solutions have been proposed. Accordingly, strong attacks are also designed in this field. One way to achieve the above goal is obfuscation. The hardware obfuscation method hides the primary function of the circuit and the normal Netlist from the attacker by adding several key gates in the original Netlist. The functionality circuit is correct only if the correct key is applied; otherwise, the circuit is obfuscated. In recent years, various obfuscation methods have been proposed. One is logic locking, the most prominent hardware protection technique since it can protect against untrusted items. Logic locking induces functional and structural changes to a design even before the layout generation. We secured the circuit against hardware Trojan insertion with a secure logic locking method based on the insertion of key gates in interference mode. We call our proposed method Secure Interference Logic Locking, SILL. SILL is based on minimum controllability in paths with maximum fan-out. In this method, we have reduced the number of key gates required for circuit obfuscation and created the maximum Hamming distance between normal and obscure outputs. In addition, the key gates are added to the circuit's complete interference, and the AES algorithm is used to generate the key. Our proposed method, SILL, was simulated in the Vivado simulation environment; the algorithms used in this method were prepared in VHDL language and designed to allow parallel execution, then applied on the original Netlist of the ISCAS85 benchmark circuits. By analyzing and comparing the results of this simulation to recent works, the amount of hardware consumption has decreased (about 5% space consumption and about a 0.15-nanosecond time delay). Then, the SAT attack algorithm was tested on ISCAS85 benchmark circuits that were obfuscated with SILL. The execution time of the attack in the second attempt was 0.24 nanoseconds longer compared to similar recent works, and it timed out in the fourth attempt. The resistance of our proposed method, having less hardware overhead and higher speed is more effective against SAT attacks than the existing conventional methods. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
33. Hardware Trojans Detection and Prevention Techniques Review.
- Author
-
Naveenkumar, R. and Sivamangai, N. M.
- Subjects
HARDWARE Trojans (Computers) ,TECHNOLOGICAL innovations ,ARTIFICIAL intelligence ,LITERATURE reviews ,INTEGRATED circuits - Abstract
Technological developments in semiconductors have created previously unheard-of chances for creativity, but they have also increased the danger of hardware Trojans, which are malevolent modifications introduced into integrated circuits (ICs) during the design or production phases. This research review addresses the changing landscape of threats and responses by examining the most recent advancements and trends in hardware trojan detection and prevention approaches. Proactive protections against Trojan insertion and dissemination include methods like cryptographic primitives, trust verification protocols, and hardware obfuscation. The field of detection approaches has expanded to include a multi-layered approach that integrates emerging technologies like artificial intelligence and machine learning with more established methods like testing and design-time analysis. Furthermore, it is possible to improve resistance to Trojan assaults while reducing performance overhead by incorporating hardware security features like physically unclonable functions and secure compartments directly into the IC architecture. Moreover, various prevention algorithms, detecting challenges and effects of the HT in recent applications are summarized with its solutions. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
34. Graph Similarity and its Applications to Hardware Security.
- Author
-
Fyrbiak, Marc, Wallat, Sebastian, Reinhard, Sascha, Bissantz, Nicolai, and Paar, Christof
- Subjects
- *
INTELLECTUAL property infringement , *GRAPH algorithms , *REVERSE engineering , *HARDWARE - Abstract
Hardware reverse engineering is a powerful and universal tool for both security engineers and adversaries. From a defensive perspective, it allows for detection of intellectual property infringements and hardware Trojans, while it simultaneously can be used for product piracy and malicious circuit manipulations. From a designer's perspective, it is crucial to have an estimate of the costs associated with reverse engineering, yet little is known about this, especially when dealing with obfuscated hardware. The contribution at hand provides new insights into this problem, based on algorithms with sound mathematical underpinnings. Our contributions are threefold: First, we present the graph similarity problem for automating hardware reverse engineering. To this end, we improve several state-of-the-art graph similarity heuristics with optimizations tailored to the hardware context. Second, we propose a novel algorithm based on multiresolutional spectral analysis of adjacency matrices. Third, in three extensively evaluated case studies, namely (1) gate-level netlist reverse engineering, (2) hardware Trojan detection, and (3) assessment of hardware obfuscation, we demonstrate the practical nature of graph similarity algorithms. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
35. Key-Based Dynamic Functional Obfuscation of Integrated Circuits Using Sequentially Triggered Mode-Based Design.
- Author
-
Koteshwara, Sandhya, Kim, Chris H., and Parhi, Keshab K.
- Abstract
This paper proposes a novel technique for hardware obfuscation termed dynamic functional obfuscation. Hardware obfuscation refers to a set of countermeasures used against IC counterfeiting and illegal overproduction. Traditionally, obfuscation encrypts semiconductor circuits using key inputs which must be set to a correct value to operate the circuit correctly. By keeping the key values secret during the manufacturing process, any attempt by unauthorized parties to overproduce chips or pirate designs is thwarted. The proposed dynamic technique differs from existing fixed obfuscation schemes as the obfuscating signals change over time. This results in inconsistent circuit behavior upon input of incorrect key, where the chip operates correctly sometimes and fails sometimes. The advantage of dynamic obfuscation is that it results in stronger obfuscation by increasing the time complexity of deciphering the correct key using brute-force attack, even with shorter keys. Moreover, the dynamic nature of these circuits also makes them resistant to reverse engineering and SAT solver-based attacks. To achieve dynamic obfuscation, ideas from hardware Trojan literature and sequentially triggered counters are utilized. A demonstration of obfuscation on sequential circuits implementing fast Fourier transform (FFT) algorithm and Ethernet IP shows low overall area and power overheads of less than 1%. Security in terms of time to attack for the FFT circuit (for a key size of 30 bits and a system operating at 100 MHz) is increased to 1 021,055 years using dynamic obfuscation compared with only 5.36 s using fixed obfuscation schemes. For the Ethernet IP core, time to attack of dynamic obfuscation with a key size of 32 bits is 1 046,423, 135 years compared with 21.47s with fixed obfuscation. It is also shown that for a key size of K bits, the lower bound for time to attack using brute-force is proportional to K 2^{K} and K 2^{2K}$ for the proposed design using one and two random number generators, respectively. [ABSTRACT FROM PUBLISHER]
- Published
- 2018
- Full Text
- View/download PDF
36. Exploiting the lock: leveraging MiG-V's logic locking for secret-data extraction.
- Author
-
Reimann, Lennart M., Madhukumar Variyar, Yadu, Huelser, Lennet, Ghinami, Chiara, Germek, Dominik, and Leupers, Rainer
- Subjects
HARDWARE Trojans (Computers) ,TECHNOLOGICAL innovations ,LOGIC circuits ,COMPUTING platforms ,MANUFACTURING processes - Abstract
The MiG-V was designed for high-security applications and is the first commercially available logic-locked RISC-V processor on the market. In this context, logic locking was used to protect the RISC-V processor design during the untrusted manufacturing process by using key-driven logic gates to obfuscate the original design. Although this method defends against malicious modifications, such as hardware Trojans, logic locking's impact on the RISC-V processor's data confidentiality during runtime has not been thoroughly examined. In this study, we evaluate the impact of logic locking on data confidentiality. By altering the logic locking key of the MiG-V while running SSL cryptographic algorithms, we identify data leakages resulting from the exploitation of the logic-locking hardware. We show that changing a single bit of the logic locking key can expose 100% of the cryptographic encryption key. This research reveals a critical security flaw in logic locking, highlighting the need for comprehensive security assessments beyond logic-locking key-recovery attacks. This article is part of the theme issue 'Emerging technologies for future secure computing platforms'. [ABSTRACT FROM AUTHOR]
- Published
- 2025
- Full Text
- View/download PDF
37. Navigating IoT Security: Insights into Architecture, Key Security Features, Attacks, Current Challenges and AI-Driven Solutions Shaping the Future of Connectivity.
- Author
-
Hassan, Ali, Nizam-Uddin, N., Quddus, Asim, Hassan, Syed Rizwan, Rehman, Ateeq Ur, and Bharany, Salil
- Subjects
ARTIFICIAL intelligence ,SMART homes ,MACHINE learning ,INTERNET of things ,RESEARCH personnel - Abstract
Enhancing the interconnection of devices and systems, the Internet of Things (IoT) is a paradigm-shifting technology. IoT security concerns are still a substantial concern despite its extraordinary advantages. This paper offers an extensive review of IoT security, emphasizing the technology's architecture, important security elements, and common attacks. It highlights how important artificial intelligence (AI) is to bolstering IoT security, especially when it comes to addressing risks at different IoT architecture layers. We systematically examined current mitigation strategies and their effectiveness, highlighting contemporary challenges with practical solutions and case studies from a range of industries, such as healthcare, smart homes, and industrial IoT. Our results highlight the importance of AI methods that are lightweight and improve security without compromising the limited resources of devices and computational capability. IoT networks can ensure operational efficiency and resilience by proactively identifying and countering security risks by utilizing machine learning capabilities. This study provides a comprehensive guide for practitioners and researchers aiming to understand the intricate connection between IoT, security challenges, and AI-driven solutions. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
38. An Overview of FPGA-inspired Obfuscation Techniques.
- Author
-
Abideen, Zain Ul, Gokulanathan, Sumathi, J. Aljafar, Muayad, and Pagliarini, Samuel
- Subjects
APPLICATION-specific integrated circuits ,VERY large scale circuit integration ,STATIC random access memory ,SEQUENTIAL circuits ,EMBEDDED computer systems ,FIELD programmable gate arrays ,LOGIC circuits ,SATISFIABILITY (Computer science) ,SERVER farms (Computer network management) - Published
- 2024
- Full Text
- View/download PDF
39. Hiding in Plain Sight: Reframing Hardware Trojan Benchmarking as a Hide&Seek Modification.
- Author
-
Sarihi, Amin, Patooghy, Ahmad, Jamieson, Peter, and Badawy, Abdel-Hameed A.
- Abstract
This letter focuses on advancing security research in the hardware design space by formally defining the realistic problem of hardware Trojan (HT) detection. The goal is to model HT detection more closely to the real world, i.e., describing the problem as “The Seeker’s Dilemma” where a detecting agent is unaware of whether circuits are infected by HTs or not. Using this theoretical problem formulation, we create a benchmark that consists of a mixture of HT-free and HT-infected restructured circuits while preserving their original functionalities. The restructured circuits are randomly infected by HTs, causing a situation where the defender is uncertain if a circuit is infected or not. We believe that our innovative benchmark and methodology of creating benchmarks will help the community judge the detection quality of different methods by comparing their success rates in circuit classification. We use our developed benchmark to evaluate three state-of-the-art HT detection tools to show baseline results for this approach. We use principal component analysis to assess the strength of our benchmark, where we observe that some restructured HT-infected circuits are mapped closely to HT-free circuits, leading to significant label misclassification by detectors. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
40. LOTUS: A Scalable Framework to Lock Multimodule Designs With One-Time Self-Destructing Key.
- Author
-
Hashemi, Mona, Mohammadi, Siamak, and Carlson, Trevor E.
- Abstract
The involvement of external parties in integrated circuit (IC) supply chain has raised a number of security issues, such as the use of device cloning, overproduction, and unauthorized integration/activation. One potential solution to this problem, logic locking, restricts access to the hardware unless the correct key is provided. Existing locking methods target limited attacks and show scalability issues. In this letter we presents LOTUS, a scalable and multilayered locking framework that provides a solution for multimodule designs by employing pseudo-dynamic keys. An important aspect of this work is that it triggers an irreversible failure once an incorrect key is applied. This evaluation demonstrates this letter’s resiliency against various deobfuscation attacks like KC2, AppSAT, OMLA, SAIL, and SCOPE with low overhead. Due to its scalability, low overhead, and destructive-when-wrong structure, LOTUS is a practical solution for large, complex, and safety-critical designs. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
41. Evaluation Methodologies in Software Protection Research.
- Author
-
De Sutter, Bjorn, Schrittwieser, Sebastian, Coppens, Bart, and Kochberger, Patrick
- Subjects
SCIENTIFIC literature ,INFORMATION technology ,COMPUTER software developers ,SOFTWARE frameworks ,MALWARE ,COMPILERS (Computer programs) ,DEBUGGING - Published
- 2025
- Full Text
- View/download PDF
42. Hardware Protection via Logic Locking Test Points.
- Author
-
Chen, Michael, Moghaddam, Elham, Mukherjee, Nilanjan, Rajski, Janusz, Tyszer, Jerzy, and Zawada, Justyna
- Subjects
INTERNET piracy ,INTEGRATED circuits ,INTEGRATED circuit design ,DISCRETE Fourier transforms ,MODE-locked lasers ,INDUSTRIAL design ,LOGIC - Abstract
Growing reverse-engineering attempts to steal or violate a design intellectual property (IP), or to identify the device technology in order to counterfeit integrated circuits (ICs), raise serious concerns in the IC design community. As the information derived from these practices can be used in a number of malicious ways, various active techniques have been proposed and deployed to protect IP, of which logic locking is a vital part. It allows inserting certain gates in a circuit’s data path to lock outputs to fixed logic values, if a wrong unlocking key is applied. This paper demonstrates that test points—industry-proven design-for-test technology used primarily to enhance the overall design testability–can also be reused in the mission mode to lock the circuit, and thus to improve the hardware security against IP piracy. In particular, it is shown that test points can facilitate the hiding of design functionality from adversaries. As a result, not only is the overall design testability improved, but also effective protection against piracy through unauthorized excess production and other forms of IP theft is ensured. Experimental results on industrial designs with test points demonstrate that the proposed scheme is effective in achieving a desired degree of hardware obfuscation. [ABSTRACT FROM AUTHOR]
- Published
- 2018
- Full Text
- View/download PDF
43. Hybrid Obfuscation to Protect Against Disclosure Attacks on Embedded Microprocessors.
- Author
-
Fyrbiak, Marc, Rokicki, Simon, Bissantz, Nicolai, Tessier, Russell, and Paar, Christof
- Subjects
EMBEDDED computer systems ,MICROPROCESSORS ,COMPUTER architecture ,RANDOM access memory ,INFORMATION sharing ,CRYPTOGRAPHY - Abstract
The risk of code reverse-engineering is particularly acute for embedded processors which often have limited available resources to protect program information. Previous efforts involving code obfuscation provide some additional security against reverse- engineering of programs, but the security benefits are typically limited and not quantifiable. Hence, new approaches to code protection and creation of associated metrics are highly desirable. This paper has two main contributions. We propose the first hybrid diversification approach for protecting embedded software and we provide statistical metrics to evaluate the protection. Diversification is achieved by combining hardware obfuscation at the microarchitecture level and the use of software-level obfuscation techniques tailored to embedded systems. Both measures are based on a compiler which generates obfuscated programs, and an embedded processor implemented in an FPGA with a randomized Instruction Set Architecture (ISA) encoding to execute the hybrid obfuscated program. We employ a fine-grained, hardware-enforced access control mechanism for information exchange with the processor and hardware-assisted booby traps to actively counteract manipulation attacks. It is shown that our approach is effective against a wide variety of possible information disclosure attacks in case of a physically present adversary. Moreover, we propose a novel statistical evaluation methodology that provides a security metric for hybrid-obfuscated programs. [ABSTRACT FROM PUBLISHER]
- Published
- 2018
- Full Text
- View/download PDF
44. Novel Dynamic State-Deflection Method for Gate-Level Design Obfuscation.
- Author
-
Dofe, Jaya and Yu, Qiaoyan
- Subjects
INTEGRATED circuits ,COMPUTER input-output equipment ,FINITE state machines ,STOCHASTIC convergence ,INTERNET protocols - Abstract
The emerging security threats in the integrated circuit supply chain do not only challenge the chip integrity, but also raise serious concerns on hardware intellectual property (IP) piracy. Hardware design obfuscation is a promising countermeasure to resist reverse engineering attacks and IP piracy. The majority of existing hardware obfuscation methods modify the original finite state machine (FSM) by adding additional state transitions and utilizing a key sequence to lock the transition from the nonfunctional states to the functional reset state. Those methods are effective to prevent attackers from entering the normal functional mode but they lack resilience if the FSM is already in the normal mode. This paper proposes to protect all the states with a low-cost state-deflection-based obfuscation method, which dynamically deflects state transitions from the original transition path to a black hole cluster if a wrong key is applied. Unlike other works that use static transitions between legal states to black hole states at the design time, this method utilizes a state rotation function (Rotatefunc) and selective register flipping function (Mapfunc) to dynamically control the state deflection paths. Hence, the difficulty of reverse engineering and thwarting register overwrite attacks is increased. Simulations performed on ISCAS’89 benchmark circuits show that the proposed method significantly reduces the difference of the net toggle activities between the correct and wrong key scenarios, and achieves up to 56% higher code coverage than the most efficient obfuscation method. Thanks to the dynamic deflection feature, on average, this method generates about 100 more unique state register patterns than other methods with moderate power increase. Moreover, the proposed method achieves the Hamming distance of primary outputs and state registers close to 50%. [ABSTRACT FROM AUTHOR]
- Published
- 2018
- Full Text
- View/download PDF
45. A robust deep learning attack immune MRAM-based physical unclonable function.
- Author
-
Adel, Mohammad Javad, Rezayati, Mohammad Hadi, Moaiyeri, Mohammad Hossein, Amirany, Abdolah, and Jafari, Kian
- Subjects
CONVOLUTIONAL neural networks ,MAGNETIC tunnelling ,ELECTRONIC equipment ,RECURRENT neural networks ,RANDOM access memory - Abstract
The ubiquitous presence of electronic devices demands robust hardware security mechanisms to safeguard sensitive information from threats. This paper presents a physical unclonable function (PUF) circuit based on magnetoresistive random access memory (MRAM). The circuit utilizes inherent characteristics arising from fabrication variations, specifically magnetic tunnel junction (MTJ) cell resistance, to produce corresponding outputs for applied challenges. In contrast to Arbiter PUF, the proposed effectively satisfies the strict avalanche criterion (SAC). Additionally, the grid-like structure of the proposed circuit preserves its resistance against machine learning-based modeling attacks. Various machine learning (ML) attacks employing multilayer perceptron (MLP), linear regression (LR), and support vector machine (SVM) networks are simulated for two-array and four-array architectures. The MLP-attack prediction accuracy was 53.61% for a two-array circuit and 49.87% for a four-array circuit, showcasing robust performance even under the worst-case process variations. In addition, deep learning-based modeling attacks in considerable high dimensions utilizing multiple networks such as convolutional neural network (CNN), recurrent neural network (RNN), MLP, and Larq are used with the accuracy of 50.31%, 50.25%, 50.31%, and 50.31%, respectively. The efficiency of the proposed circuit at the layout level is also investigated for simplified two-array architecture. The simulation results indicate that the proposed circuit offers intra and inter-hamming distance (HD) with a mean of 0.98% and 49.96%, respectively, and a mean diffuseness of 49.09%. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
46. A Survey on Logic-Locking Characteristics and Attacks.
- Author
-
Subbiah, Karthik and Chinnathevar, Sujatha
- Published
- 2024
- Full Text
- View/download PDF
47. A Novel Probability-Based Logic-Locking Technique: ProbLock.
- Author
-
Yue, Michael and Tehranipoor, Sara
- Subjects
SEQUENTIAL circuits ,INTEGRATED circuits ,COMBINATIONAL circuits ,ALGORITHMS ,SECURITY systems ,DESIGN techniques - Abstract
Integrated circuit (IC) piracy and overproduction are serious issues that threaten the security and integrity of a system. Logic locking is a type of hardware obfuscation technique where additional key gates are inserted into the circuit. Only the correct key can unlock the functionality of that circuit; otherwise, the system produces the wrong output. In an effort to hinder these threats on ICs, we have developed a probability-based logic-locking technique to protect the design of a circuit. Our proposed technique, called "ProbLock", can be applied to both combinational and sequential circuits through a critical selection process. We used a filtering process to select the best location of key gates based on various constraints. Each step in the filtering process generates a subset of nodes for each constraint. We also analyzed the correlation between each constraint and adjusted the strength of the constraints before inserting key gates. We tested our algorithm on 40 benchmarks from the ISCAS '85 and ISCAS '89 suites. We evaluated ProbLock against a SAT attack and measured how long the attack took to successfully generate a key value. The SAT attack took longer for most benchmarks using ProbLock which proves viable security in hardware obfuscation. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
48. Survey of Security Issues in Memristor-Based Machine Learning Accelerators for RF Analysis
- Author
-
Will Lillis, Max Cohen Hoffing, and Wayne Burleson
- Subjects
memristors ,eNVM ,compute-in-memory ,analog-edge processors ,RF ,machine learning ,Electronic computers. Computer science ,QA75.5-76.95 ,Electric apparatus and materials. Electric circuits. Electric networks ,TK452-454.4 - Abstract
We explore security aspects of a new computing paradigm that combines novel memristors and traditional Complimentary Metal Oxide Semiconductor (CMOS) to construct a highly efficient analog and/or digital fabric that is especially well-suited to Machine Learning (ML) inference processors for Radio Frequency (RF) signals. Analog and/or hybrid hardware designed for such application areas follows different constraints from that of traditional CMOS. This paradigm shift allows for enhanced capabilities but also introduces novel attack surfaces. Memristors have different properties than traditional CMOS which can potentially be exploited by attackers. In addition, the mixed signal approximate computing model has different vulnerabilities than traditional digital implementations. However both the memristor and the ML computation can be leveraged to create security mechanisms and countermeasures ranging from lightweight cryptography, identifiers (e.g., Physically Unclonable Functions (PUFs), fingerprints, and watermarks), entropy sources, hardware obfuscation and leakage/attack detection methods. Three different threat models are proposed: (1) Supply Chain, (2) Physical Attacks, and (3) Remote Attacks. For each threat model, potential vulnerabilities and defenses are identified. This survey reviews a variety of recent work from the hardware and ML security literature and proposes open problems for both attack and defense. The survey emphasizes the growing area of RF signal analysis and identification in terms of commercial space, as well as military applications and threat models. We differ from other recent surveys that target ML, in general, neglecting RF applications.
- Published
- 2024
- Full Text
- View/download PDF
49. Secure File Operations: Using Advanced Encryption Standard for Strong Data Protection.
- Author
-
Nelakuditi, Nikhil Chand, Namburi, Nanda Kishore, Sayyad, Jilani, Rudraraju, Dinesh Varma, Govindan, Raja, and Rao, Peddada Venkateswara
- Subjects
ADVANCED Encryption Standard ,DATA security ,DATA protection ,CYBERTERRORISM ,DATA transmission systems - Abstract
In our rapidly digitalizing world, the safeguarding of sensitive information stands as a critical concern for organizations across industries. This paper addresses the evolving complexities in data security by advocating the Advanced Encryption Standard (AES) algorithm as a robust defense against the expanding landscape of cyber threats. As financial, healthcare, and educational data transition to digital formats, vulnerabilities in data transmission become more pronounced. To counter these risks and ensure the integrity, confidentiality, and authenticity of essential data, this paper emphasizes the implementation of AES encryption. Thoroughly scrutinizing the widely acknowledged AES algorithm, we highlight its effectiveness and adaptability in securing data. The paper underscores the indispensability of AES in the modern data security milieu, emphasizing its role not only in securing information during transmission and storage but also in decryption, granting authorized users access to protected data. By embracing AES encryption and decryption, organizations can strengthen their defenses against various data-related threats, maintaining the trust and assurance of stakeholders. This work emphasizes the pressing demand for AES encryption and decryption in an era where data security takes precedence, offering valuable insights into their significance and practical application for the protection of crucial digital assets. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
50. Physical Design Obfuscation of Hardware: A Comprehensive Investigation of Device and Logic-Level Techniques.
- Author
-
Vijayakumar, Arunkumar, Patil, Vinay C., Holcomb, Daniel E., Paar, Christof, and Kundu, Sandip
- Abstract
The threat of hardware reverse engineering is a growing concern for a large number of applications. A main defense strategy against reverse engineering is hardware obfuscation. In this paper, we investigate physical obfuscation techniques, which perform alterations of circuit elements that are difficult or impossible for an adversary to observe. The examples of such stealthy manipulations are changes in the doping concentrations or dielectric manipulations. An attacker will, thus, extract a netlist, which does not correspond to the logic function of the device-under-attack. This approach of camouflaging has garnered recent attention in the literature. In this paper, we expound on this promising direction to conduct a systematic end-to-end study of the VLSI design process to find multiple ways to obfuscate a circuit for hardware security. This paper makes three major contributions. First, we provide a categorization of the available physical obfuscation techniques as it pertains to various design stages. There is a large and multidimensional design space for introducing obfuscated elements and mechanisms, and the proposed taxonomy is helpful for a systematic treatment. Second, we provide a review of the methods that have been proposed or in use. Third, we present recent and new device and logic-level techniques for design obfuscation. For each technique considered, we discuss feasibility of the approach and assess likelihood of its detection. Then we turn our focus to open research questions, and conclude with suggestions for future research directions. [ABSTRACT FROM PUBLISHER]
- Published
- 2017
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.