18 results on '"Hardware obfuscation"'
Search Results
2. Hardware protection and authentication through netlist level obfuscation.
- Author
-
Chakraborty, Rajat Subhra and Bhunia, Swarup
- Published
- 2008
3. ObNoCs: Protecting Network-on-Chip Fabrics Against Reverse-Engineering Attacks.
- Author
-
HALDER, DIPAL, MERUGU, MANEESH, and RAY, SANDIP
- Subjects
SYSTEMS on a chip ,TEXTILES ,TOPOLOGY - Abstract
Modern System-on-Chip designs typically use Network-on-Chip (NoC) fabrics to implement coordination among integrated hardware blocks. An important class of security vulnerabilities involves a rogue foundry reverse-engineering the NoC topology and routing logic. In this paper, we develop an infrastructure, ObNoCs, for protecting NoC fabrics against such attacks. ObNoCs systematically replaces router connections with switches that can be programmed after fabrication to induce the desired topology. Our approach provides provable redaction of NoC functionality: switch configurations induce a large number of legal topologies, only one of which corresponds to the intended topology. We implement the ObNoCs methodology on Intel Quartus™ Platform, and experimental results on realistic SoC designs show that the architecture incurs minimal overhead in power, resource utilization, and system latency. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
4. The Anatomy of Hardware Reverse Engineering: An Exploration of Human Factors During Problem Solving.
- Author
-
WIESEN, CARINA, BECKER, STEFFEN, WALENDY, RENÉ, PAAR, CHRISTOF, and RUMMEL, NIKOL
- Subjects
FIELD programmable gate arrays ,PSYCHOLOGICAL literature ,COGNITIVE science ,ADVANCED Encryption Standard ,REVERSE engineering ,PYTHON programming language - Published
- 2023
- Full Text
- View/download PDF
5. EVHA: Explainable Vision System for Hardware Testing and Assurance—An Overview.
- Author
-
HASAN, MAHFUZ AL, MOSTAFIZ, MOHAMMAD TAHSIN, AN LE, THOMAS, JULIA, JAKE, VASHISTHA, NIDISH, TAHERI, SHAYAN, and ASADIZANJANI, NAVID
- Subjects
SCANNING electron microscopy ,INTEGRATED circuits ,GENERATIVE adversarial networks ,MANUFACTURING processes ,HARDWARE - Abstract
Due to the ever-growing demands for electronic chips in different sectors, semiconductor companies have been mandated to offshore their manufacturing processes. This unwanted matter has made security and trustworthiness of their fabricated chips concerning and has caused the creation of hardware attacks. In this condition, different entities in the semiconductor supply chain can act maliciously and execute an attack on the design computing layers, from devices to systems. Our attack is a hardware Trojan that is inserted during mask generation/fabrication in an untrusted foundry. The Trojan leaves a footprint in the fabrication through addition, deletion, or change of design cells. To tackle this problem, we propose EVHA (Explainable Vision System for Hardware Testing and Assurance) in this work, which can detect the smallest possible change to a design in a low-cost, accurate, and fast manner. The inputs to this system are scanning electron microscopy images acquired from the integrated circuits under examination. The system output is the determination of integrated circuit status in terms of having any defect and/or hardware Trojan through addition, deletion, or change in the design cells at the cell level. This article provides an overview on the design, development, implementation, and analysis of our defense system. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
6. AdaTest: Reinforcement Learning and Adaptive Sampling for On-chip Hardware Trojan Detection.
- Author
-
HUILI CHEN, XINQIAO ZHANG, KE HUANG, and KOUSHANFAR, FARINAZ
- Subjects
REINFORCEMENT learning ,REWARD (Psychology) ,ADAPTIVE testing ,INTEGRATED circuits ,SOFTWARE architecture ,HARDWARE - Abstract
This paper proposes AdaTest, a novel adaptive test pattern generation framework for efficient and reliable Hardware Trojan (HT) detection. HT is a backdoor attack that tampers with the design of victim integrated circuits (ICs). AdaTest improves the existing HT detection techniques in terms of scalability and accuracy of detecting smaller Trojans in the presence of noise and variations. To achieve high trigger coverage, AdaTest leverages Reinforcement Learning (RL) to produce a diverse set of test inputs. Particularly, we progressively generate test vectors with high 'reward' values in an iterative manner. In each iteration, the test set is evaluated and adaptively expanded as needed. Furthermore, AdaTest integrates adaptive sampling to prioritize test samples that provide more information for HT detection, thus reducing the number of samples while improving the samples' quality for faster exploration. We develop AdaTest with a Software/Hardware co-design principle and provide an optimized on-chip architecture solution. AdaTest's architecture minimizes the hardware overhead in two ways: (i) Deploying circuit emulation on programmable hardware to accelerate reward evaluation of the test input; (ii) Pipelining each computation stage in AdaTest by automatically constructing auxiliary circuit for test input generation, reward evaluation, and adaptive sampling. We evaluate AdaTest's performance on various HT benchmarks and compare it with two prior works that use logic testing for HT detection. Experimental results show that AdaTest engenders up to two orders of test generation speedup and two orders of test set size reduction compared to the prior works while achieving the same level or higher Trojan detection rate. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
7. Using Pattern of On-Off Routers and Links and Router Delays to Protect Network-on-Chip Intellectual Property.
- Author
-
BISWAS, ARNAB KUMAR
- Subjects
INTELLECTUAL property ,ELECTRONIC design automation ,NETWORK routers ,SYSTEMS on a chip ,MULTIPROCESSORS - Abstract
Intellectual Property (IP) reuse is a well known practice in chip design processes. Nowadays, network-onchips (NoCs) are increasingly used as IP and sold by various vendors to be integrated in a multiprocessor system-on-chip (MPSoC). However, IP reuse exposes the design to IP theft, and an attacker can launch IP stealing attacks against NoC IPs. With the growing adoption of MPSoC, such attacks can result in huge financial losses. In this article, we propose four NoC IP protection techniques using fingerprint embedding: ON-OFF router-based fingerprinting (ORF), ON-OFF link-based fingerprinting (OLF), Router delay-based fingerprinting (RTDF), and Row delay-based fingerprinting (RWDF). ORF and OLF techniques use patterns of ON-OFF routers and links, respectively, while RTDF and RWDF techniques use router delays to embed fingerprints. We show that all of our proposed techniques require much less hardware overhead compared to an existing NoC IP security solution (square spiral routing) and also provide better security from removal and masking attacks. In particular, our proposed techniques require between 40.75% and 48.43% less router area compared to the existing solution. We also show that our solutions do not affect the normal packet latency and hence do not degrade the NoC performance. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
8. Protecting Network-on-Chip Intellectual Property Using Timing Channel Fingerprinting.
- Author
-
BISWAS, ARNAB KUMAR and SIKDAR, BIPLAB
- Subjects
INTELLECTUAL property ,INTELLECTUAL property theft ,TIME management - Abstract
The theft of Intellectual property (IP) is a serious security threat for all businesses that are involved in the creation of IP. In this article, we consider such attacks against IP for Network-on-Chip (NoC) that are commonly used as a popular on-chip scalable communication medium for Multiprocessor System-on-Chip. As a protection mechanism, we propose a timing channel fingerprinting method and show its effectiveness by implementing five different solutions using this method. We also provide a formal proof of security of the proposed method. We show that the proposed technique provides better security and requires much lower hardware overhead (64%–74% less) compared to an existing NoC IP security solution without affecting the normal packet latency or degrading the NoC performance. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
9. NN-Lock: A Lightweight Authorization to Prevent IP Threats of Deep Learning Models.
- Author
-
ALAM, MANAAR, SAHA, SAYANDEEP, MUKHOPADHYAY, DEBDEEP, and KUNDU, SANDIP
- Subjects
ARTIFICIAL neural networks ,DEEP learning ,TRADE secrets ,GENETIC algorithms ,INTELLECTUAL property ,BUSINESS models - Abstract
The prevalent usage and unparalleled recent success of Deep Neural Network (DNN) applications have raised the concern of protecting their Intellectual Property (IP) rights in different business models to prevent the theft of trade secrets. In this article, we propose a lightweight, generic, key-based DNN IP protection methodology, NN-Lock, to defend against unauthorized usage of stolen DNN models. NN-Lock utilizes SBox, a cryptographic primitive, with good security properties to encrypt each parameter of a trained DNN model with the secret keys derived from a master key through a key-scheduling algorithm. The method ensures that only an authorized user with a correct master key can accurately use the locked DNN model. Evaluation results of NN-Lock on a Google Coral edge device for various DNN architectures on several datasets show that for an incorrect master key, the accuracy of a locked model is that of a random classifier. The dense network of encrypted parameters makes the method robust against the model fine-tuning attack and a novel approximation attack using the Genetic Algorithm, which achieves reasonable success against another recent IP protection scheme called HPNN [Chakraborty et al. 2020]. The security evaluation of NN-Lock against other families of attacks demonstrates its soundness in practical scenarios. NN-Lock does not modify any internal structure of a DNN model, making it scalable for all of the existing DNN implementations without adversely affecting their performance. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
10. Fortifying Vehicular Security through Low Overhead Physically Unclonable Functions.
- Author
-
LABRADO, CARSON, THAPLIYAL, HIMANSHU, and MOHANTY, SARAJU P.
- Subjects
TELECOMMUNICATION systems ,ELECTRONIC control ,PERFORMANCE standards ,TELECOMMUNICATION ,CRYPTOGRAPHY - Abstract
Within vehicles, the Controller Area Network (CAN) allows efficient communication between the electronic control units (ECUs) responsible for controlling the various subsystems. The CAN protocol was not designed to include much support for secure communication. The fact that so many critical systems can be accessed through an insecure communication network presents a major security concern. Adding security features to CAN is difficult due to the limited resources available to the individual ECUs and the costs that would be associated with adding the necessary hardware to support any additional security operations without overly degrading the performance of standard communication. Replacing the protocol is another option, but it is subject to many of the same problems. The lack of security becomes even more concerning as vehicles continue to adopt smart features. Smart vehicles have a multitude of communication interfaces an attacker could exploit to gain access to the networks. In this work, we propose a security framework that is based on physically unclonable functions (PUFs) and lightweight cryptography (LWC). The framework does not require any modification to the standard CAN protocol while also minimizing the amount of additional message overhead required for its operation. The improvements in our proposed framework result in major reduction in the number of CAN frames that must be sent during operation. For a system with 20 ECUs, for example, our proposed framework only requires 6.5% of the number of CAN frames that is required by the existing approach to successfully authenticate every ECU. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
11. Robust and Attack Resilient Logic Locking with a High Application-Level Impact.
- Author
-
YUNTAO LIU, ZUZAK, MICHAEL, YANG XIE, CHAKRABORTY, ABHISHEK, and SRIVASTAVA, ANKUR
- Subjects
LOGIC ,INTEGRATED circuits ,INTELLECTUAL property ,SUPPLY chains ,KEY agreement protocols (Computer network protocols) - Abstract
Logic locking is a hardware security technique aimed at protecting intellectual property against security threats in the IC supply chain, especially those posed by untrusted fabrication facilities. Such techniques incorporate additional locking circuitry within an integrated circuit (IC) that induces incorrect digital functionality when an incorrect verification key is provided by a user. The amount of error induced by an incorrect key is known as the effectiveness of the locking technique. A family of attacks known as "SAT attacks" provide a strong mathematical formulation to find the correct key of locked circuits. To achieve high SAT resilience (i.e., complexity of SAT attacks), many conventional logic locking schemes fail to inject sufficient error into the circuit when the key is incorrect. For example, in the case of SARLock and Anti-SAT, there are usually very few (or only one) input minterms that cause any error at the circuit output. The state-of-the-art stripped functionality logic locking (SFLL) technique provides a wide spectrum of configurations that introduced a tradeoff between SAT resilience and effectiveness. In this work, we prove that such a tradeoff is universal among all logic locking techniques. To attain high effectiveness of locking without compromising SAT resilience, we propose a novel logic locking scheme, called Strong Anti-SAT (SAS). In addition to SAT attacks, removal-based attacks are another popular kind of attack formulation against logic locking where the attacker tries to identify and remove the locking structure. Based on SAS, we also propose Robust SAS (RSAS) that is resilient to removal attacks and maintains the same SAT resilience and effectiveness as SAS. SAS and RSAS have the following significant improvements over existing techniques. (1) We prove that the SAT resilience of SAS and RSAS against SAT attack is not compromised by increase in effectiveness. (2) In contrast to prior work that focused solely on the circuit-level locking impact, we integrate SAS-locked modules into an 80386 processor and show that SAS has a high application-level impact. (3) Our experiments show that SAS and RSAS exhibit better SAT resilience than SFLL and their effectiveness is similar to SFLL. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
12. Challenging the Security of Logic Locking Schemes in the Era of Deep Learning: A Neuroevolutionary Approach.
- Author
-
SISEJKOVIC, DOMINIK, MERCHANT, FARHAD, REIMANN, LENNART M., SRIVASTAVA, HARSHIT, HALLAWA, AHMED, and LEUPERS, RAINER
- Subjects
DEEP learning ,CONVOLUTIONAL neural networks ,INTEGRATED circuit design ,ARTIFICIAL neural networks ,FUTURE (Logic) ,LOGIC - Abstract
Logic locking is a prominent technique to protect the integrity of hardware designs throughout the integrated circuit design and fabrication flow. However, in recent years, the security of locking schemes has been thoroughly challenged by the introduction of various deobfuscation attacks. As in most research branches, deep learning is being introduced in the domain of logic locking as well. Therefore, in this article we present SnapShot, a novel attack on logic locking that is the first of its kind to utilize artificial neural networks to directly predict a key bit value from a locked synthesized gate-level netlist without using a golden reference. Hereby, the attack uses a simpler yet more flexible learning model compared to existing work. Two different approaches are evaluated. The first approach is based on a simple feedforward fully connected neural network. The second approach utilizes genetic algorithms to evolve more complex convolutional neural network architectures specialized for the given task. The attack flow offers a generic and customizable framework for attacking locking schemes using machine learning techniques. We perform an extensive evaluation of Snap- Shot for two realistic attack scenarios, comprising both reference combinational and sequential benchmark circuits as well as silicon-proven RISC-V core modules. The evaluation results show that SnapShot achieves an average key prediction accuracy of 82.60% for the selected attack scenario, with a significant performance increase of 10.49 percentage points compared to the state of the art. Moreover, SnapShot outperforms the existing technique on all evaluated benchmarks. The results indicate that the security foundation of common logic locking schemes is built on questionable assumptions. Based on the lessons learned, we discuss the vulnerabilities and potentials of logic locking uncovered by SnapShot. The conclusions offer insights into the challenges of designing future logic locking schemes that are resilient to machine learning attacks. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
13. Network-on-Chip Intellectual Property Protection Using Circular Path--based Fingerprinting.
- Author
-
BISWAS, ARNAB KUMAR
- Subjects
INTELLECTUAL property ,NETWORK routers ,NUMBER theory ,DESIGN techniques ,SYSTEMS on a chip - Abstract
Intellectual property (IP) reuse is a well-known technique in chip design industry. But this technique also exposes a security vulnerability called IP stealing attack. Network-on-Chip (NoC) is an on-chip scalable communication medium and is used as an IP and sold by various vendors to be integrated in a Multiprocessor System-on-Chip (MPSoC). An attacker can launch IP stealing attack against NoC IP. In this article,we propose a NoC IP protection technique called circular path--based fingerprinting (CPF) using fingerprint embedding. We also provide a theoretical model using polyomino theory to get the number of distinct fingerprints in a NoC. We show that our proposed technique requires much less hardware overhead compared to an existing NoC IP security solution and also provides better security against removal and masking attacks. In particular, our proposed CPF technique requires 27.41% less router area compared to the existing solution. We also show that our CPF solution does not affect the normal packet latency and hence does not degrade the NoC performance. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
14. A Cellular Automata Guided Obfuscation Strategy For Finite-State-Machine Synthesis.
- Author
-
Karmakar, Rajit, Jana, Suman Sekhar, and Chattopadhyay, Santanu
- Subjects
FINITE state machines ,CELLULAR automata ,INTELLECTUAL property ,SEMICONDUCTOR industry ,SUPPLY chains ,COMBINATIONAL circuits - Abstract
A popular countermeasure against IP piracy relies on obfuscating the Finite State Machine (FSM), which is assumed to be the heart of a digital system. In this paper, we propose to use a special class of non-group additive cellular automata (CA) called D1 * CA, and it's counterpart D1 * CA
dual to obfuscate each state-transition of an FSM. The synthesized FSM exhibits correct state-transitions only for a correct key, which is a designer's secret. The proposed easily testable key-controlled FSM synthesis scheme can thwart reverse engineering attacks, thus offers IP protection. [ABSTRACT FROM AUTHOR]- Published
- 2019
- Full Text
- View/download PDF
15. Mode-based Obfuscation using Control-Flow Modifications.
- Author
-
Koteshwara, Sandhya, Kim, Chris H., and Parhi, Keshab K.
- Published
- 2016
- Full Text
- View/download PDF
16. Circuit Camouflage Integration for Hardware IP Protection.
- Author
-
Cocchi, Ronald P., Baukus, James P., Chow, Lap Wai, and Wang, Bryan J.
- Published
- 2014
- Full Text
- View/download PDF
17. Circuit Camouflage Integration for Hardware IP Protection.
- Author
-
Cocchi, Ronald P., Baukus, James P., Lap Wai Chow, and Wang, Bryan J.
- Subjects
LOGIC circuit design ,REVERSE engineering ,NAND gates ,COMPUTER-aided design ,ROUTING (Computer network management) - Abstract
Circuit camouflage technologies can be integrated into standard logic cell developments using traditional CAD tools. Camouflaged logic cells are integrated into a typical design flow using standard front end and back end models. Camouflaged logic cells obfuscate a circuit's function by introducing subtle cell design changes at the GDS level. The logic function of a camouflaged logic cell is extremely difficult to determine through silicon imaging analysis preventing netlist extraction, clones and counterfeits. The application of circuit camouflage as part of a customer's design flow can protect hardware IP from reverse engineering. Camouflage fill techniques further inhibit Trojan circuit insertion by completely filling the design with realistic circuitry that does not affect the primary design function. All unused silicon appears to be functional circuitry, so an attacker cannot find space to insert a Trojan circuit. The integration of circuit camouflage techniques is compatible with standard chip design flows and EDA tools, and ICs using such techniques have been successfully employed in high-attack commercial and government segments. Protected under issued and pending patents. [ABSTRACT FROM AUTHOR]
- Published
- 2014
- Full Text
- View/download PDF
18. Hardware assisted control flow obfuscation for embedded processors.
- Author
-
Zhuang, Xiaotong, Zhang, Tao, Lee, Hsien-Hsin S., and Pande, Santosh
- Published
- 2004
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.