145 results on '"Hardware obfuscation"'
Search Results
2. ReTrustFSM: Toward RTL Hardware Obfuscation-A Hybrid FSM Approach
- Author
-
M. Sazadur Rahman, Rui Guo, Hadi M. Kamali, Fahim Rahman, Farimah Farahmandi, and Mark Tehranipoor
- Subjects
Hardware obfuscation ,logic locking ,FSM ,RTL ,structural analysis ,BMC ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 - Abstract
Hardware obfuscating is a proactive design-for-trust technique against IC supply chain threats, i.e., IP piracy and overproduction. Many studies have evaluated numerous techniques for obfuscation purposes. Nevertheless, de-obfuscation attacks have demonstrated their insufficiency. This paper proposes a register-transfer (RT) level finite-state-machine (FSM) obfuscation technique called ReTrustFSM that allows designers to obfuscate at the earliest possible stage. ReTrustFSM combines three types of secrecy: explicit external secrecy via an external key, implicit external secrecy based on specific clock cycles, and internal secrecy through a concealed FSM transition function. So, the robustness of ReTrustFSM relies on the external key, the external primary input patterns, and the cycle accuracy of applying such external stimuli. Additionally, ReTrustFSM defines a cohesive relationship between the features of Boolean problems and the required time for de-obfuscation, ensuring a maximum execution time for oracle-guided de-obfuscation attacks. Various attacks are employed to test ReTrustFSM’s robustness, including structural and machine learning attacks, functional I/O queries (BMC), and FSM attacks. We have also analyzed the corruptibility and overhead of design-under-obfuscation. Our experimental results demonstrate the robustness of ReTrustFSM at acceptable overhead/corruption while resisting such threat models.
- Published
- 2023
- Full Text
- View/download PDF
3. Hardware Obfuscation of AES IP Core Using PUFs and PRNG: A Secure Cryptographic Key Generation Solution for Internet-of-Things Applications
- Author
-
Chhabra, Surbhi and Lata, Kusum
- Published
- 2022
- Full Text
- View/download PDF
4. Development and Evaluation of Hardware Obfuscation Benchmarks
- Author
-
Amir, Sarah, Shakya, Bicky, Xu, Xiaolin, Jin, Yier, Bhunia, Swarup, Tehranipoor, Mark, and Forte, Domenic
- Published
- 2018
- Full Text
- View/download PDF
5. On the Difficulty of FSM-based Hardware Obfuscation
- Author
-
Marc Fyrbiak, Sebastian Wallat, Jonathan Déchelotte, Nils Albartus, Sinan Böcker, Russell Tessier, and Christof Paar
- Subjects
Hardware Reverse Engineering ,Hardware Obfuscation ,Hardware Nanomites ,FSM-based Hardware Obfuscation ,Computer engineering. Computer hardware ,TK7885-7895 ,Information technology ,T58.5-58.64 - Abstract
In today’s Integrated Circuit (IC) production chains, a designer’s valuable Intellectual Property (IP) is transparent to diverse stakeholders and thus inevitably prone to piracy. To protect against this threat, numerous defenses based on the obfuscation of a circuit’s control path, i.e. Finite State Machine (FSM), have been proposed and are commonly believed to be secure. However, the security of these sequential obfuscation schemes is doubtful since realistic capabilities of reverse engineering and subsequent manipulation are commonly neglected in the security analysis. The contribution of our work is threefold: First, we demonstrate how high-level control path information can be automatically extracted from third-party, gate-level netlists. To this end, we extend state-of-the-art reverse engineering algorithms to deal with Field Programmable Gate Array (FPGA) gate-level netlists equipped with FSM obfuscation. Second, on the basis of realistic reverse engineering capabilities we carefully review the security of state-of-the-art FSM obfuscation schemes. We reveal several generic strategies that bypass allegedly secure FSM obfuscation schemes and we practically demonstrate our attacks for a several of hardware designs, including cryptographic IP cores. Third, we present the design and implementation of Hardware Nanomites, a novel obfuscation scheme based on partial dynamic reconfiguration that generically mitigates existing algorithmic reverse engineering.
- Published
- 2018
- Full Text
- View/download PDF
6. Preventing DNN Model IP Theft via Hardware Obfuscation
- Author
-
Victor C. Ferreira, Vinay C. Patil, Felipe M. G. França, Brunno F. Goldstein, Sandip Kundu, and Alexandre S. Nery
- Subjects
010302 applied physics ,business.industry ,Computer science ,Deep learning ,ComputingMilieux_LEGALASPECTSOFCOMPUTING ,Public key infrastructure ,Cryptography ,010501 environmental sciences ,Encryption ,Trusted system ,01 natural sciences ,Data modeling ,Obfuscation (software) ,Embedded system ,0103 physical sciences ,Hardware obfuscation ,Artificial intelligence ,Electrical and Electronic Engineering ,business ,0105 earth and related environmental sciences - Abstract
Training accurate deep learning (DL) models require large amounts of training data, significant work in labeling the data, considerable computing resources, and substantial domain expertise. In short, they are expensive to develop. Hence, protecting these models, which are valuable storehouses of intellectual properties (IP), against model stealing/cloning attacks is of paramount importance. Today’s mobile processors feature Neural Processing Units (NPUs) to accelerate the execution of DL models. DL models executing on NPUs are vulnerable to hyperparameter extraction via side-channel attacks and model parameter theft via bus monitoring attacks. This paper presents a novel solution to defend against DL IP theft in NPUs during model distribution and deployment/execution via lightweight, keyed model obfuscation scheme. Unauthorized use of such models results in inaccurate classification. In addition, we present an ideal end-to-end deep learning trusted system composed of: 1) model distribution via hardware root-of-trust and public-key cryptography infrastructure (PKI) and 2) model execution via low-latency memory encryption. We demonstrate that our proposed obfuscation solution achieves IP protection objectives without requiring specialized training or sacrificing the model’s accuracy. In addition, the proposed obfuscation mechanism preserves the output class distribution while degrading the model’s accuracy for unauthorized parties, covering any evidence of a hacked model.
- Published
- 2021
- Full Text
- View/download PDF
7. A Resource-Efficient Binary CNN Implementation for Enabling Contactless IoT Authentication
- Author
-
Hasan, Mahmudul, Hoque, Tamzidul, Ganji, Fatemeh, Woodard, Damon, Forte, Domenic, and Shomaji, Sumaiya
- Published
- 2024
- Full Text
- View/download PDF
8. Hardware Obfuscation and Logic Locking: A Tutorial Introduction
- Author
-
Tamzidul Hoque, Rajat Subhra Chakraborty, and Swarup Bhunia
- Subjects
Reverse engineering ,Focus (computing) ,Sequential logic ,Computer science ,business.industry ,Supply chain ,Reading (computer) ,02 engineering and technology ,Integrated circuit ,computer.software_genre ,020202 computer hardware & architecture ,law.invention ,Hardware and Architecture ,law ,Embedded system ,0202 electrical engineering, electronic engineering, information engineering ,Hardware obfuscation ,Electrical and Electronic Engineering ,business ,computer ,Software ,AND gate - Abstract
Editor’s note : If you are designing or integrating hardware IP blocks into your designs, and you are using common global supply chains, then reading this overview article on how to protect your IP against reverse engineering, piracy, and malicious alteration attacks is a must. The authors give a comprehensive overview of current countermeasures that can be used at RTL, gate-, and layout-level to protect your design with a focus on combinational and sequential logic locking and a discussion on merits, overheads, and shortcomings of such techniques. —Jurgen Teich, FAU Erlangen
- Published
- 2020
- Full Text
- View/download PDF
9. On the Construction of Composite Finite Fields for Hardware Obfuscation
- Author
-
Xinmiao Zhang and Yingjie Lao
- Subjects
Computer science ,business.industry ,Cryptography ,02 engineering and technology ,020202 computer hardware & architecture ,Theoretical Computer Science ,Finite field ,Computational Theory and Mathematics ,Computer engineering ,Hardware and Architecture ,Logic gate ,Obfuscation ,0202 electrical engineering, electronic engineering, information engineering ,Hardware obfuscation ,Finite field arithmetic ,business ,Software ,Decoding methods - Abstract
Hardware obfuscation is a technique that modifies the circuit to hide the functionality. Obfuscations through algorithmic modifications add protection in addition to circuit-level techniques, and their effects on the data paths can be analyzed and controlled at the architectural level. Many error-correcting coding and cryptography algorithms are based on finite field arithmetic. For the first time, this paper proposes a hardware obfuscation scheme achieved through varying finite field constructions and primitive element representations. Also the variations are effectively transformed to bit permuters controlled by obfuscation keys to achieve high level of security with very small complexity overheads. To illustrate the effectiveness, the proposed scheme is applied to obfuscate Reed-Solomon decoders, which are broadly used in communication and storage systems. For a (255, 239) RS decoder over finite field $GF(256)$GF(256), the proposed scheme achieves 1239 bits of independent obfuscation key with 4.4 percent area overhead, while yielding no penalty on the throughput and only one extra clock cycle of latency.
- Published
- 2019
- Full Text
- View/download PDF
10. Towards the enhancement of AES IP security using hardware obfuscation technique: A practical approach for secure data transmission in IoT.
- Author
-
Chhabra, Surbhi and Lata, Kusum
- Abstract
The global market of developing Internet of Things (IoT) devices increases rapidly with improved design goals like cost, energy efficiency, and performance. Unfortunately, the above design goals often come at the expense of security. Illegal access to the network, malicious device control, compromised sensitive information, and theft of personal data are main threats to these devices. As a result, the Advanced Encryption Standard (AES) is sometimes employed to ensure safe transmission and processing of data in IoT Systems. However, tampering, cloning, and reverse engineering are main concerns that impair the computational complexity of the 128‐bit AES at the hardware level. Recently hardware obfuscation‐based AES has emerged as a comprehensive hardware security approach for reducing threat impacts. The hardware obfuscation schemes efficiently introduce obfuscation keys for AES to conceal its functionality. The Xilinx Vivado 2016.2 software and BASYS‐3 FPGA have been used to implement obfuscated AES approaches in this work. The proposed methods have low resource usage in terms of area and power overhead while providing a high level of security in terms of Hamming Distance of 50% and Avalanche Effect of 40% for each obfuscation method. We have also analyzed the probability of success for brute‐force attacks for proposed methodologies. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
11. Hardware Obfuscation of the 16-bit S-box in the MK-3 Cipher
- Author
-
Jason Blocklove, Michael Thomas Kurdziel, Marcin Lukowiak, Steve Farris, and Stanislaw Radziszowski
- Subjects
Reverse engineering ,S-box ,Cipher ,Computer science ,Hardware Trojan ,Obfuscation ,Hardware obfuscation ,ComputingMilieux_LEGALASPECTSOFCOMPUTING ,Side channel attack ,Computer security ,computer.software_genre ,computer ,Block cipher - Abstract
At different stages of the Integrated Circuit (IC) lifecycle there are attacks which threaten to compromise the integrity of the design through piracy, reverse engineering, hardware Trojan insertion, side channel analysis, and other physical attacks. Some of the most notable challenges in this field deal specifically with Intellectual Property (IP) theft and reverse engineering attacks. One method by which some of these concerns can be addressed is by introducing hardware obfuscation to the design in various forms. In this work we evaluate the effectiveness of a few different forms of netlist-level hardware obfuscation of a 16-bit substitution box component of a customizable cipher MK-3. These obfuscation methods were attacked using a satisfiability (SAT) attack, which is able to iteratively rule out classes of keys at once. This has been shown to be very effective against many forms of hardware obfuscation. A method to successfully defend against this attack is described in this paper. This method introduces a modified SIMON block cipher as a One-way Random Function (ORF) that is used to generate an obfuscation key. The S-box obfuscated using this 32-bit key and a round-reduced implementation of the SIMON cipher is shown to be secure against a SAT attack for at least 5 days.
- Published
- 2021
- Full Text
- View/download PDF
12. Physical Unclonable Functions based Hardware Obfuscation Techniques: A State of the Art
- Author
-
Husam Kareem and Dmitriy Dunaev
- Subjects
Reverse engineering ,ComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMS ,Hardware security module ,Computer science ,Physical unclonable function ,Hardware obfuscation ,State (computer science) ,Electronics ,Architecture ,Computer security ,computer.software_genre ,computer ,Task (project management) - Abstract
A clear majority of electronic devices applications used in our daily life require a reliable, secure architecture, e.g., healthcare, social security cards, electronic meters, and smart homes. As a result, many studies are trying to develop appropriate solutions to tackle hardware security threats such as IC piracy, IC overbuilding, reverse engineering, counterfeiting, and tampering. Hardware obfuscation has been introduced as one of the leading robust, low-cost security solutions against different security threats, especially when combined with physical unclonable functions. Considering the inherent irreproducibility of PUFs, this method can provide a high-level security system. However, finding an applicable existent PUF or implementing a new PUF design that meets each hardware obfuscation requirements is not a trivial task. This study reviews and discusses hardware security systems based on PUFs inherited variations and the corresponding hardware obfuscation approaches.
- Published
- 2021
- Full Text
- View/download PDF
13. Hardware Obfuscation Driven by QR Pattern using High Level Transformations
- Author
-
Sharath Kumar D.R.V.A
- Subjects
Computer science ,business.industry ,Embedded system ,Computer Science (miscellaneous) ,Hardware obfuscation ,Electrical and Electronic Engineering ,business - Published
- 2019
- Full Text
- View/download PDF
14. Evaluation of Hardware Obfuscation Techniques using Obfuscation Tool oLLVM
- Author
-
Shuichi Ichikawa, Naoki Fujieda, and Yuumi Matsuoka
- Subjects
Obfuscation (software) ,Computer science ,business.industry ,Embedded system ,Hardware obfuscation ,Electrical and Electronic Engineering ,business ,Industrial and Manufacturing Engineering - Published
- 2019
- Full Text
- View/download PDF
15. Hardware obfuscation for IP protection
- Author
-
Tamzidul Hoque, Moshiur Rahman, Abdulrahman Alaql, and Swarup Bhunia
- Subjects
Reverse engineering ,Record locking ,Process (engineering) ,business.industry ,Computer science ,Supply chain ,ComputingMilieux_LEGALASPECTSOFCOMPUTING ,Cryptography ,Business model ,Computer security ,computer.software_genre ,Obfuscation (software) ,Hardware obfuscation ,business ,computer - Abstract
The horizontal business model adopted by the semiconductor industry has resulted in a manufacturing process that has integrated various foreign entities focusing on individual production steps. However, serious trust issues have emerged with the internationalization of the semiconductor supply chain, and the trust concerns grow further with the proliferation of theft, reverse engineering (RE), and piracy of hardware intellectual property (IP). Unlike the software industry, the semiconductor supply chain cannot benefit from traditional cryptographic solutions due to the requirement of white-box accessibility to the hardware IP. Therefore, hardware obfuscation has originated as a potential countermeasure against dreaded supply chain attacks. The obfuscation process aims to hide the design intent and lock functionality by introducing structural and functional transformations to the IP, which increases the resistance against unauthorized use and potential exploitation of the design by an adversary. In this chapter, we investigate hardware obfuscation techniques that have been developed in the past decade and the limitations and challenges of these techniques. In particular, we explore the evolution of different techniques that are applicable at various supply chain stages of the semiconductor life cycle, the development of obfuscation benchmarks, and the research trends in the area of obfuscation. We also expand on the innovative attacks that have been developed to compromise the obfuscation techniques, as well as the countermeasures that are introduced to combat them. This chapter also sheds light on the lessons learned from the decade-long research on obfuscation by discussing the attack trends and unsolved challenges. Finally, we conclude by presenting a road map that aims to improve the existing solutions and provides improved security metrics for systematic evaluation.
- Published
- 2020
- Full Text
- View/download PDF
16. Development and Evaluation of Hardware Obfuscation Benchmarks
- Author
-
Xiaolin Xu, Yier Jin, Swarup Bhunia, Mark Tehranipoor, Bicky Shakya, Domenic Forte, and Sarah Amir
- Subjects
Reverse engineering ,business.industry ,Computer science ,Suite ,ComputingMilieux_LEGALASPECTSOFCOMPUTING ,020207 software engineering ,Context (language use) ,02 engineering and technology ,Benchmarking ,computer.software_genre ,020202 computer hardware & architecture ,Set (abstract data type) ,Obfuscation ,0202 electrical engineering, electronic engineering, information engineering ,Benchmark (computing) ,Hardware obfuscation ,Software engineering ,business ,computer - Abstract
Obfuscation is a promising solution for securing hardware intellectual property (IP) against various attacks, such as reverse engineering, piracy, and tampering. Due to the lack of standard benchmarks, proposed techniques by researchers and practitioners in the community are evaluated by existing benchmark suites such as ISCAS-85, ISCAS-89, and ITC-99. These open source benchmarks, though widely utilized, are not necessarily suitable for the purpose of evaluating hardware obfuscation techniques. In this context, we believe that it is important to establish a set of well-defined benchmarks, on which the effectiveness of new and existing obfuscation techniques and attacks on them can be compared. In this paper, we describe a set of such benchmarks obfuscated with some popular methods that we created to facilitate this need. These benchmarks have been made publicly available on Trust-Hub web portal. Moreover, we provide the first evaluation of several obfuscation approaches based on the metrics and existing attacks using this new suite. Finally, we discuss our observations and guidance for future work in hardware obfuscation and benchmarking.
- Published
- 2018
- Full Text
- View/download PDF
17. Netlist-based Measures for Hardware Obfuscation: A Preliminary Study
- Author
-
Shotaro Yamada and Shuichi Ichikawa
- Subjects
Reverse engineering ,021110 strategic, defence & security studies ,Computer science ,business.industry ,020208 electrical & electronic engineering ,0211 other engineering and technologies ,ComputingMilieux_LEGALASPECTSOFCOMPUTING ,02 engineering and technology ,Software obfuscation ,computer.software_genre ,Software ,Embedded system ,Logic gate ,Obfuscation ,0202 electrical engineering, electronic engineering, information engineering ,Hardware obfuscation ,Netlist ,business ,computer ,Hardware_LOGICDESIGN ,Electronic circuit - Abstract
It is important to protect the intellectual properties of logic circuits from reverse engineering. One of the countermeasures is logic obfuscation, which complicates the internal structures of logic circuits to prevent reverse engineering. A few researches have been conducted to simplify logic obfuscation using software obfuscation tools and high-level synthesis. However, it is not quantitatively evident whether the generated circuits are more complex than plain circuits. This paper discusses the three metrics of obfuscated netlists to evaluate the obfuscation methods proposed in previous studies. We confirmed that the obfuscated circuits are actually more complex than the original circuits using the proposed metrics.
- Published
- 2020
- Full Text
- View/download PDF
18. Hardware Obfuscation Techniques on FPGA-Based Systems
- Author
-
Oksana Kotkova, Abdulrahman Kataeba Batiaa, Olha Ponomarenko, and Valeriy Gorbachov
- Subjects
Hardware security module ,Computer science ,business.industry ,020206 networking & telecommunications ,02 engineering and technology ,Reference monitor ,Obfuscation (software) ,ComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMS ,Trusted computing base ,Hardware Trojan ,Embedded system ,0202 electrical engineering, electronic engineering, information engineering ,Hardware obfuscation ,Key (cryptography) ,020201 artificial intelligence & image processing ,business ,Field-programmable gate array - Abstract
There is a great variety of hardware Trojan detection and prevention approaches. However, state of art approaches cannot provide a full guarantee that an integrated circuit or complex electronic system is free of hardware Trojan. We introduced a reference monitor obfuscation approach on the base of formal transformations of structural system models. The approach ensures development of secure systems, operating in the presence of hardware Trojans. The reference monitor obfuscation ensures the main key reference monitor properties: must be non-bypassable and tamper-proof. This concept can be used as a prevention countermeasure against hardware Trojans at the following steps of development cycle of integrated circuit on the FPGA platform: prevention at design, prevention at fabrication, and prevention at post-fabrication. The paper demonstrates an implementation of reference monitor obfuscation approach by physical modeling on FPGA-based systems.
- Published
- 2020
- Full Text
- View/download PDF
19. Key Generation for Hardware Obfuscation Using Strong PUFs
- Author
-
Shahed Enamul Quadir and John A. Chandy
- Subjects
Reverse engineering ,Record locking ,Computer Networks and Communications ,Computer science ,Physical unclonable function ,ComputingMilieux_LEGALASPECTSOFCOMPUTING ,02 engineering and technology ,computer.software_genre ,lcsh:Technology ,01 natural sciences ,obfuscation ,0103 physical sciences ,0202 electrical engineering, electronic engineering, information engineering ,Hardware_INTEGRATEDCIRCUITS ,010302 applied physics ,Key generation ,Authentication ,lcsh:T ,business.industry ,Applied Mathematics ,Chip ,020202 computer hardware & architecture ,Computer Science Applications ,Obfuscation (software) ,Computational Theory and Mathematics ,Embedded system ,Hardware obfuscation ,authentication ,counterfeiting ,physically unclonable function ,business ,computer ,Software ,key generation - Abstract
As a result of the increased use of contract foundries, internet protocol (IP) theft, excess production and reverse engineering are major concerns for the electronics and defense industries. Hardware obfuscation and IP locking can be used to make a design secure by replacing a part of the circuit with a key-locked module. In order to ensure each chip has unique keys, previous work has proposed using physical unclonable functions (PUF) to lock the circuit. However, these designs are area intensive. In this work, we propose a strong PUF-based hardware obfuscation scheme to uniquely lock each chip.
- Published
- 2019
- Full Text
- View/download PDF
20. Hardware Obfuscation Through Reconfiguration Finite Field Arithmetic Units
- Author
-
Ankur A Sharma, Xinmiao Zhang, and Yingjie Lao
- Subjects
021110 strategic, defence & security studies ,business.industry ,Computer science ,0211 other engineering and technologies ,Control reconfiguration ,Cryptography ,02 engineering and technology ,Integrated circuit ,020202 computer hardware & architecture ,law.invention ,Finite field ,law ,Embedded system ,Obfuscation ,0202 electrical engineering, electronic engineering, information engineering ,Hardware obfuscation ,Multiplier (economics) ,Finite field arithmetic ,business ,Error detection and correction ,Decoding methods - Abstract
Intellectual property (IP) piracy and electronic counterfeiting have emerged as critical threats to the semiconductor industry in the current horizontal business model where the supply chain usually involves a large number of vendors. Hence, techniques that can protect integrated circuit (IC) against reverse engineering are demanded, especially for security-critical tasks. Hardware obfuscation is a broad category of techniques that could create ambiguity to the adversary by hiding the actual information from illegitimate users. This paper presents a novel hardware obfuscation design through reconfigurable finite field arithmetic units, which can be employed in various error correction and cryptographic algorithms. The effectiveness and efficiency of the proposed methods are verified by an obfuscated reformulated inversion-less Berlekamp-Massey (RiBM) Reed-Solomon decoder. Our experimental results show the hardware implementation of RiBM based Reed-Solomon decoder built using reconfigurable field multiplier designs. The proposed design provides only very low overhead.
- Published
- 2019
- Full Text
- View/download PDF
21. Hardware Obfuscation of AES through Finite Field Construction Variation
- Author
-
Xinmiao Zhang, Eslam Yahya Tawfik, Jingbo Zhou, and Phillip Shvartsman
- Subjects
Computer science ,business.industry ,Advanced Encryption Standard ,02 engineering and technology ,Encryption ,020202 computer hardware & architecture ,Obfuscation (software) ,Finite field ,Computer engineering ,Obfuscation ,0202 electrical engineering, electronic engineering, information engineering ,Hardware obfuscation ,Overhead (computing) ,020201 artificial intelligence & image processing ,Finite field arithmetic ,business ,Throughput (business) - Abstract
To protect intellectual property, hardware obfuscation is necessary to conceal the implemented function. Besides logic-level approaches, hardware obfuscation can be done through algorithmic modifications. Prior algorithmic obfuscations address signal processing systems and those with variable data flow. This paper focuses on the obfuscation of systems based on finite field arithmetic, which are broadly adopted in digital communications. Netlists of hardware units with different field constructions are first analyzed to evaluate possible attacks. Taking into account the specifics of the computations in the Advanced Encryption Standard (AES) algorithm, optimized schemes are proposed to efficiently introduce obfuscation keys utilizing the variation of finite field construction. For an example pipelined fully-unrolled AES encryptor, the proposed scheme leads to 480 bits of obfuscation key with 3% area overhead without sacrificing the throughput. The proposed obfuscation method can be also extended to other algorithms involving finite field arithmetic.
- Published
- 2019
- Full Text
- View/download PDF
22. An Orthogonal Algorithm for Key Management in Hardware Obfuscation
- Author
-
Pengjun Wang, Qiaoyan Yu, Jiawei Wang, Xiaoyong Xue, Zhicun Luan, Xiaoyang Zeng, and Yuejun Zhang
- Subjects
021110 strategic, defence & security studies ,Hardware security module ,Computer science ,business.industry ,0211 other engineering and technologies ,Key distribution ,ComputingMilieux_LEGALASPECTSOFCOMPUTING ,02 engineering and technology ,020202 computer hardware & architecture ,Obfuscation (software) ,0202 electrical engineering, electronic engineering, information engineering ,Benchmark (computing) ,Hardware obfuscation ,System integration ,Orthogonal matrix ,business ,Key management ,Algorithm - Abstract
The globalization of supply chain makes semiconductor chips susceptible to various security threats. Design obfuscation techniques have been widely investigated to thwart intellectual property (IP) piracy attacks. Key distribution among IP providers, system integration team, and end users remains as a challenging problem. This work proposes an orthogonal obfuscation method, which utilizes an orthogonal matrix to authenticate obfuscation keys, rather than directly examining each activation key. The proposed method hides the keys by using an orthogonal obfuscation algorithm to increasing the key retrieval time, such that the primary keys for IP cores will not be leaked. The simulation results show that the proposed method reduces the key retrieval time by 36.3% over the baseline. The proposed obfuscation methods have been successfully applied to ISCAS'89 benchmark circuits. Experimental results indicate that the orthogonal obfuscation only increases the area by 3.4% and consumes 4.7% more power than the baseline.1
- Published
- 2019
- Full Text
- View/download PDF
23. Enhancing Data Security using Obfuscated 128-bit AES Algorithm - An Active Hardware Obfuscation Approach at RTL Level
- Author
-
Surbhi Chhabra and Kusum Lata
- Subjects
Computer science ,business.industry ,Advanced Encryption Standard ,Data security ,020206 networking & telecommunications ,02 engineering and technology ,Encryption ,020202 computer hardware & architecture ,Obfuscation ,0202 electrical engineering, electronic engineering, information engineering ,Hardware obfuscation ,Hardware_ARITHMETICANDLOGICSTRUCTURES ,business ,Algorithm - Abstract
Nowadays, integrated circuits (ICs) security grown as a primary responsibility at every stage of IC supply chain due to the globalized design, fabrication, test, deployment and monitoring of an IC. In this regard, Advanced Encryption Standard (AES) is widely accepted and supported in both the domain, software as well as hardware. To diminish the effect and cause of different threats, researchers identified that the hardware obfuscation based AES is a promising technique and a solution towards piracy and reverse engineering. This paper discusses about the design and simulation of 128-bit AES algorithm using active hardware obfuscation techniques. 128-bit AES is designed and simulated using Xilinx Vivado 2016.2. In this paper simulation results of 128-bit AES algorithm are analyzed with and without obfuscation techniques. Results shows that with obfuscation techniques 128 bit AES algorithm offer higher level of security and implementation flexibility with small area overhead and power overhead. The robustness of proposed algorithm is also analyzed in the form of throughput and efficiency. The authors also presented the power consumption and analyzed the area overhead of proposed algorithm with different xilinx 7 -series FPGAs.
- Published
- 2018
- Full Text
- View/download PDF
24. Hardware Obfuscation Using Strong PUFs
- Author
-
Wenjing Rao and Soroush Khaleghi
- Subjects
Reverse engineering ,business.industry ,Computer science ,Cryptography ,02 engineering and technology ,computer.software_genre ,Computer security ,020202 computer hardware & architecture ,Obfuscation (software) ,ComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMS ,0202 electrical engineering, electronic engineering, information engineering ,Key (cryptography) ,Hardware obfuscation ,020201 artificial intelligence & image processing ,State (computer science) ,business ,computer ,Unique key ,Countermeasure (computer) - Abstract
IC piracy is a significant security threat, where malicious manufacturers can produce unauthorized extra chips and/or steal the information of a design through reverse engineering attempts. As a countermeasure, hardware obfuscation schemes usually withhold a part of the design (which thereafter constitutes the "key") by replacing it with configurable modules. Enforcing the configurable module to be filled in with the withheld key information enables a post-manufacturing activation of each authenticate chip, albeit with a a need to state the threat of a leaked common key. To ensure that each chip has a unique key, Physically Unclonable Functions (PUFs) have been proposed to be integrated with hardware obfuscation. Such a paradigm is constrained to use weak PUFs, because, to uniquely set the key (the content of the configurable module) for each chip, the designer needs to fully characterize the PUFs for all the chips. In this paper, we argue that a powerful attacker in the position of a manufacturer can fully characterize all the weak PUFs, and use any leaked key to break the obfuscation framework. This paper proposes a strong PUF-based hardware obfuscation scheme to effectively prevent IC piracy even in the case of a leaked key from some activated chip.
- Published
- 2018
- Full Text
- View/download PDF
25. Hardware Obfuscation: Techniques and Open Challenges
- Author
-
Becker, Georg T., Fyrbiak, Marc, Kison, Christian, Bossuet, Lilian, editor, and Torres, Lionel, editor
- Published
- 2017
- Full Text
- View/download PDF
26. Introduction to Hardware Obfuscation: Motivation, Methods and Evaluation
- Author
-
Shakya, Bicky, Tehranipoor, Mark M., Bhunia, Swarup, Forte, Domenic, Forte, Domenic, editor, Bhunia, Swarup, editor, and Tehranipoor, Mark M., editor
- Published
- 2017
- Full Text
- View/download PDF
27. VLSI Test and Hardware Security Background for Hardware Obfuscation
- Author
-
Saqib, Fareena, Plusquellic, Jim, Forte, Domenic, editor, Bhunia, Swarup, editor, and Tehranipoor, Mark M., editor
- Published
- 2017
- Full Text
- View/download PDF
28. A Unified Methodology for Hardware Obfuscation and IP Watermarking
- Author
-
Saurabh Gangurde and Binod Kumar
- Subjects
Hardware security module ,business.industry ,Computer science ,ComputingMilieux_LEGALASPECTSOFCOMPUTING ,Encryption ,Computer security ,computer.software_genre ,Obfuscation ,Netlist ,Benchmark (computing) ,Hardware obfuscation ,Overhead (computing) ,business ,Digital watermarking ,computer - Abstract
Hardware security is a matter of increasing importance in the modern world. With increasing threats of piracy and theft, it is needed to devise methodologies to mitigate these concerns. Obfuscating the design netlist is a popular method to achieve this to a significant extent. However, full security guarantee is not provided with the encryption approach. Under this scenario, a watermarking method complements the security guarantee by providing claims of IP authorship. In this paper, we present a unified methodology for circuit encryption and watermarking to enhance hardware security. Experiments on several ISCAS’85 benchmark circuits show that the proposed methodology has average 8.2% area overhead and 11.3% power overhead.
- Published
- 2019
- Full Text
- View/download PDF
29. SAIL: Machine Learning Guided Structural Analysis Attack on Hardware Obfuscation
- Author
-
Swarup Bhunia, Jonathan Cruz, and Prabuddha Chakraborty
- Subjects
FOS: Computer and information sciences ,Structure (mathematical logic) ,Reverse engineering ,Computer Science - Cryptography and Security ,Computer science ,business.industry ,0211 other engineering and technologies ,ComputingMilieux_LEGALASPECTSOFCOMPUTING ,02 engineering and technology ,computer.software_genre ,Machine learning ,020202 computer hardware & architecture ,Set (abstract data type) ,Scalability ,Obfuscation ,0202 electrical engineering, electronic engineering, information engineering ,Benchmark (computing) ,Hardware obfuscation ,Artificial intelligence ,business ,Cryptography and Security (cs.CR) ,computer ,021106 design practice & management ,Vulnerability (computing) - Abstract
Obfuscation is a technique for protecting hardware intellectual property (IP) blocks against reverse engineering, piracy, and malicious modifications. Current obfuscation efforts mainly focus on functional locking of a design to prevent black-box usage. They do not directly address hiding design intent through structural transformations, which is an important objective of obfuscation. We note that current obfuscation techniques incorporate only: (1) local, and (2) predictable changes in circuit topology. In this paper, we present SAIL, a structural attack on obfuscation using machine learning (ML) models that exposes a critical vulnerability of these methods. Through this attack, we demonstrate that the gate-level structure of an obfuscated design can be retrieved in most parts through a systematic set of steps. The proposed attack is applicable to all forms of logic obfuscation, and significantly more powerful than existing attacks, e.g., SAT-based attacks, since it does not require the availability of golden functional responses (e.g. an unlocked IC). Evaluation on benchmark circuits show that we can recover an average of around 84% (up to 95%) transformations introduced by obfuscation. We also show that this attack is scalable, flexible, and versatile., 6 pages, 6 figures, 8 tables
- Published
- 2018
30. A hardware obfuscation technique for manufacturing a secure 3D IC
- Author
-
Siroos Madani, Indira Kalyan Dutta, Mohammad R. Madani, Yamini Joshi, and Magdy Bayoumi
- Subjects
021110 strategic, defence & security studies ,Emerging technologies ,business.industry ,Computer science ,Reliability (computer networking) ,0211 other engineering and technologies ,Three-dimensional integrated circuit ,02 engineering and technology ,Chip ,020202 computer hardware & architecture ,Outsourcing ,Safeguard ,Trojan ,Embedded system ,Hardware_INTEGRATEDCIRCUITS ,0202 electrical engineering, electronic engineering, information engineering ,Hardware obfuscation ,business - Abstract
3D Integrated Circuit (3D-IC) is an emerging technology that can address many challenging problems threatening the security of the chip by split manufacturing [1]. One of the disadvantages of split manufacturing is the uncertainty in the reliability of the last foundry that is responsible for the complete bonding of tiers. In this work, we present an innovative approach that safeguard the outsourcing of the entire 3D IC manufacturing including the last bonding stage. The proposed technique not only obfuscates the design functionality but immunes the IC against Trojan insertion.
- Published
- 2018
- Full Text
- View/download PDF
31. Hardware Obfuscation Methods for Hardware Trojan Prevention and Detection
- Author
-
Qiaoyan Yu, Zhiming Zhang, Sean Kramer, and Jaya Dofe
- Subjects
010302 applied physics ,Computer science ,business.industry ,Supply chain ,Late stage ,Trojan horse ,02 engineering and technology ,Integrated circuit ,01 natural sciences ,020202 computer hardware & architecture ,law.invention ,ComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMS ,law ,Hardware Trojan ,Trojan ,Embedded system ,0103 physical sciences ,0202 electrical engineering, electronic engineering, information engineering ,Hardware obfuscation ,business - Abstract
The globalized semiconductor supply chain make integrated circuits (ICs) potentially suffer from diverse security threats. Among different hardware attacks, Trojan horse insertion has emerged as a major security concern. To mitigate the hardware Trojan insertion happened in the late stage of IC supply chain, researchers recognize that hardware obfuscation is a promising technique. This chapter first reviews the state-of-the-art hardware obfuscation methods at different levels, and then summarizes the metrics that can be used to assess the effectiveness of hardware obfuscation. At the end of this chapter, future research directions for hardware obfuscation against Trojan insertion are discussed.
- Published
- 2017
- Full Text
- View/download PDF
32. Exploiting hardware obfuscation methods to prevent and detect hardware Trojans
- Author
-
Zhiming Zhang, Qiaoyan Yu, and Jaya Dofe
- Subjects
Hardware security module ,Engineering ,medicine.medical_specialty ,Supply chain ,0211 other engineering and technologies ,Computer security compromised by hardware failure ,02 engineering and technology ,Integrated circuit ,Computer security ,computer.software_genre ,law.invention ,Hardware Trojan ,law ,0202 electrical engineering, electronic engineering, information engineering ,medicine ,021110 strategic, defence & security studies ,business.industry ,Adversary ,020202 computer hardware & architecture ,ComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMS ,Embedded system ,Logic gate ,Hardware obfuscation ,business ,computer ,Computer hardware - Abstract
Due to the globalized semiconductor supply chain, integrated circuits suffer from hardware security attacks. Among various attacks, hardware Trojan insertions have emerged as a major security concern. An adversary modifies the original circuit to accomplish the malicious intentions through the hardware Trojan. Hardware obfuscation has been demonstrated as a promising technique to strengthen hardware implementation against hardware Trojan insertion in the late stage of the supply chain. This work reviews the state-of-the-art hardware obfuscation methods, with the special emphasis on the corresponding efforts made for hardware Trojan prevention and detection. Furthermore, we summarize the evaluation metrics utilized in literature to assess the effectiveness of hardware obfuscation methods. Future directions for hardware obfuscation against hardware Trojans are discussed in this work, as well.
- Published
- 2017
- Full Text
- View/download PDF
33. A Framework for Data Protection of Embedded Systems in IoT Applications
- Author
-
Rajendran, Sreeja, Angrisani, Leopoldo, Series Editor, Arteaga, Marco, Series Editor, Chakraborty, Samarjit, Series Editor, Chen, Jiming, Series Editor, Chen, Shanben, Series Editor, Chen, Tan Kay, Series Editor, Dillmann, Rüdiger, Series Editor, Duan, Haibin, Series Editor, Ferrari, Gianluigi, Series Editor, Ferre, Manuel, Series Editor, Jabbari, Faryar, Series Editor, Jia, Limin, Series Editor, Kacprzyk, Janusz, Series Editor, Khamis, Alaa, Series Editor, Kroeger, Torsten, Series Editor, Li, Yong, Series Editor, Liang, Qilian, Series Editor, Martín, Ferran, Series Editor, Ming, Tan Cher, Series Editor, Minker, Wolfgang, Series Editor, Misra, Pradeep, Series Editor, Mukhopadhyay, Subhas, Series Editor, Ning, Cun-Zheng, Series Editor, Nishida, Toyoaki, Series Editor, Oneto, Luca, Series Editor, Panigrahi, Bijaya Ketan, Series Editor, Pascucci, Federica, Series Editor, Qin, Yong, Series Editor, Seng, Gan Woon, Series Editor, Speidel, Joachim, Series Editor, Veiga, Germano, Series Editor, Wu, Haitao, Series Editor, Zamboni, Walter, Series Editor, Tan, Kay Chen, Series Editor, Kumar Jain, Pradip, editor, Nath Singh, Yatindra, editor, Gollapalli, Ravi Paul, editor, and Singh, S. P., editor
- Published
- 2024
- Full Text
- View/download PDF
34. Advances in Logic Locking
- Author
-
Tehranipoor, Mark, Zamiri Azar, Kimia, Asadizanjani, Navid, Rahman, Fahim, Mardani Kamali, Hadi, Farahmandi, Farimah, Tehranipoor, Mark, Zamiri Azar, Kimia, Asadizanjani, Navid, Rahman, Fahim, Mardani Kamali, Hadi, and Farahmandi, Farimah
- Published
- 2024
- Full Text
- View/download PDF
35. On the Construction of Composite Finite Fields for Hardware Obfuscation.
- Author
-
Zhang, Xinmiao and Lao, Yingjie
- Subjects
- *
FINITE fields , *COMPOSITE construction - Abstract
Hardware obfuscation is a technique that modifies the circuit to hide the functionality. Obfuscations through algorithmic modifications add protection in addition to circuit-level techniques, and their effects on the data paths can be analyzed and controlled at the architectural level. Many error-correcting coding and cryptography algorithms are based on finite field arithmetic. For the first time, this paper proposes a hardware obfuscation scheme achieved through varying finite field constructions and primitive element representations. Also the variations are effectively transformed to bit permuters controlled by obfuscation keys to achieve high level of security with very small complexity overheads. To illustrate the effectiveness, the proposed scheme is applied to obfuscate Reed-Solomon decoders, which are broadly used in communication and storage systems. For a (255, 239) RS decoder over finite field $GF(256)$GF(256), the proposed scheme achieves 1239 bits of independent obfuscation key with 4.4 percent area overhead, while yielding no penalty on the throughput and only one extra clock cycle of latency. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
36. On the Difficulty of FSM-based Hardware Obfuscation
- Author
-
Fyrbiak, Marc, Wallat, Sebastian, Déchelotte, Jonathan, Albartus, Nils, Böcker, Sinan, Tessier, Russell, and Paar, Christof
- Subjects
Hardware Nanomites ,lcsh:Computer engineering. Computer hardware ,lcsh:T58.5-58.64 ,lcsh:Information technology ,020208 electrical & electronic engineering ,FSM-based Hardware Obfuscation ,lcsh:TK7885-7895 ,0102 computer and information sciences ,02 engineering and technology ,01 natural sciences ,020202 computer hardware & architecture ,Hardware Obfuscation ,Hardware Reverse Engineering ,010201 computation theory & mathematics ,0202 electrical engineering, electronic engineering, information engineering ,Hardware_LOGICDESIGN - Abstract
In today’s Integrated Circuit (IC) production chains, a designer’s valuable Intellectual Property (IP) is transparent to diverse stakeholders and thus inevitably prone to piracy. To protect against this threat, numerous defenses based on the obfuscation of a circuit’s control path, i.e. Finite State Machine (FSM), have been proposed and are commonly believed to be secure. However, the security of these sequential obfuscation schemes is doubtful since realistic capabilities of reverse engineering and subsequent manipulation are commonly neglected in the security analysis. The contribution of our work is threefold: First, we demonstrate how high-level control path information can be automatically extracted from third-party, gate-level netlists. To this end, we extend state-of-the-art reverse engineering algorithms to deal with Field Programmable Gate Array (FPGA) gate-level netlists equipped with FSM obfuscation. Second, on the basis of realistic reverse engineering capabilities we carefully review the security of state-of-the-art FSM obfuscation schemes. We reveal several generic strategies that bypass allegedly secure FSM obfuscation schemes and we practically demonstrate our attacks for a several of hardware designs, including cryptographic IP cores. Third, we present the design and implementation of Hardware Nanomites, a novel obfuscation scheme based on partial dynamic reconfiguration that generically mitigates existing algorithmic reverse engineering., IACR Transactions on Cryptographic Hardware and Embedded Systems, Volume 2018, Issue 3
- Published
- 2018
- Full Text
- View/download PDF
37. Comparative Analysis of Hardware Obfuscation for IP Protection
- Author
-
Bicky Shakya, Sarah Amir, Domenic Forte, Mark Tehranipoor, and Swarup Bhunia
- Subjects
010302 applied physics ,Reverse engineering ,Engineering ,business.industry ,Supply chain ,ComputingMilieux_LEGALASPECTSOFCOMPUTING ,02 engineering and technology ,Integrated circuit ,Multiple methods ,Intellectual property ,Computer security ,computer.software_genre ,Ip piracy ,01 natural sciences ,020202 computer hardware & architecture ,law.invention ,Obfuscation (software) ,law ,0103 physical sciences ,0202 electrical engineering, electronic engineering, information engineering ,Hardware obfuscation ,business ,computer - Abstract
In the era of globalized Integrated Circuit (IC) design and manufacturing flow, a rising issue to the silicon industry is various attacks on hardware intellectual property (IP). As a measure to ensure security along the supply chain against IP piracy, tampering and reverse engineering, hardware obfuscation is considered a reliable defense mechanism. Sequential and combinational obfuscations are the primary classes of obfuscation, and multiple methods have been proposed in each type in recent years. This paper presents an overview of obfuscation techniques and a qualitative comparison of the two major types.
- Published
- 2017
- Full Text
- View/download PDF
38. Introduction to Hardware Obfuscation: Motivation, Methods and Evaluation
- Author
-
Mark Tehranipoor, Bicky Shakya, Domenic Forte, and Swarup Bhunia
- Subjects
010302 applied physics ,Reverse engineering ,Computer science ,business.industry ,Supply chain ,ComputingMilieux_LEGALASPECTSOFCOMPUTING ,02 engineering and technology ,Integrated circuit ,Software obfuscation ,Intellectual property ,Adversary ,computer.software_genre ,Computer security ,Encryption ,01 natural sciences ,020202 computer hardware & architecture ,law.invention ,law ,0103 physical sciences ,0202 electrical engineering, electronic engineering, information engineering ,Hardware obfuscation ,business ,computer - Abstract
While the globalization of the semiconductor production process has accelerated innovation, lowered costs, and reduced time-to-market, it has also created grave trust issues among the different entities involved in the production process. Theft, reverse engineering, and piracy of silicon intellectual property (IP) are the realities that manufacturers and vendors of integrated circuits must face today. In order to combat these threats, obfuscation has emerged as a viable candidate for semiconductor or hardware IP protection. Obfuscation techniques aim at concealing or locking the underlying intellectual property of a semiconductor product, such as IP cores, gate-level designs, or layout, in order to prevent an untrusted party or adversary from reverse engineering and/or exploiting the design. In this chapter, we will review emerging techniques for hardware obfuscation . We will describe the semiconductor supply chain in detail and outline the specific threats associated with each stage in the supply chain. We will also introduce the field of software obfuscation and related concepts that predate hardware obfuscation. Lastly, we will introduce relevant metrics for implementing and evaluating the various hardware obfuscation techniques.
- Published
- 2017
- Full Text
- View/download PDF
39. VLSI Test and Hardware Security Background for Hardware Obfuscation
- Author
-
Jim Plusquellic and Fareena Saqib
- Subjects
010302 applied physics ,Hardware security module ,Cryptographic primitive ,business.industry ,Computer science ,Design flow ,02 engineering and technology ,Computer security ,computer.software_genre ,01 natural sciences ,020202 computer hardware & architecture ,Embedded system ,Custom hardware attack ,0103 physical sciences ,0202 electrical engineering, electronic engineering, information engineering ,Hardware obfuscation ,Hardware compatibility list ,Hardware acceleration ,business ,Key management ,computer - Abstract
This chapter discusses the fundamental concepts of design and testing and their role in hardware obfuscation. It outlines the traditional design flow of integrated circuits and assesses the vulnerabilities associated with the verification techniques and testing structures that can expose the design details and help reverse-engineer the functionality. A survey of security enhancement schemes has been presented. Furthermore, different classifications of hardware obfuscation have been discussed that cover the associated vulnerabilities of key management in nonvolatile memories (NVMs). The review of nonvolatile memories, emerging technologies and hardware-based cryptographic primitives, physical unclonable functions (PUFs) and true random number generators (TRNGs) and their use in hardware obfuscation techniques has been deliberated.
- Published
- 2017
- Full Text
- View/download PDF
40. Development of a Layout-Level Hardware Obfuscation Tool
- Author
-
Wayne Burleson, Georg T. Becker, Shweta Malik, and Christof Paar
- Subjects
Standard cell ,Reverse engineering ,business.industry ,Computer science ,ComputingMilieux_LEGALASPECTSOFCOMPUTING ,computer.software_genre ,Open research ,Embedded system ,Logic gate ,Obfuscation ,Code (cryptography) ,Hardware obfuscation ,Compiler ,business ,Software engineering ,computer - Abstract
While hardware obfuscation has been used in industry for many years, very few scientific papers discuss layout-level obfuscation. The main aim of this paper is to start a discussion about hardware obfuscation in the academic community and point out open research problems. In particular, we introduce a very flexible layout-level obfuscation tool that we use as a case study for hardware obfuscation. In this obfuscation tool, a small custom-made obfuscell is used in conjunction with a standard cell to build a new obfuscated standard cell library called Obfusgates. This standard cell library can be used to synthesize any HDL code with standard synthesis tools, e.g. Synopsis Design Compiler. However, only obfuscating the functionality of individual gates is not enough. Not only the functionality of individual gates, but also their connectivity, leaks important important information about the design. In our tool we therefore designed the obfuscation gates to include a large number of "dummy wires". Due to these dummy wires, the connectivity of the gates in addition to their logic functionality is obfuscated. We argue that this aspect of obfuscation is of great importance in practice and that there are many interesting open research questions related to this.
- Published
- 2015
- Full Text
- View/download PDF
41. Hardware obfuscation of AES IP core using combinational hardware Trojan circuit for secure data transmission in IoT applications.
- Author
-
Chhabra, Surbhi and Lata, Kusum
- Subjects
DATA transmission systems ,COMBINATIONAL circuits ,SYSTEMS on a chip ,ADVANCED Encryption Standard ,HAMMING distance ,INTERNET of things ,REVERSE engineering ,SEMICONDUCTOR industry - Abstract
Summary: In semiconductor industry, reusability‐based System‐on‐Chip architecture using hardware intellectual property (IP) cores play a prominent role in Internet‐of‐Things (IoT) applications for secure data transmission. The advent of IoT makes it possible for physical things to transmit, process, compute, and receive data over internet. But, it also introduces in‐device communication security vulnerabilities. Advanced Encryption Standard (AES) IP has been used to address security vulnerabilities in IoT. It is an efficient and high‐performance crypto algorithm used in IoT devices for secure and fast data encryption. However, due to rise of many attacks, the security of AES IP is also under threat. Hardware obfuscation is one such prominent countermeasure that mitigates hardware attacks such as tampering, reverse engineering, and malicious alteration. This article presents secure AES IP mechanism using the potential technique of obfuscation inspired by the concept of combinational hardware Trojan. Experimental results show that the proposed technique is resilient against reverse‐engineering, malicious alteration, Boolean satisfiability attack, and key‐sensitizing attacks. The confusion and diffusion features of obfuscated AES IP are higher in terms of Hamming distance, avalanche effect, and balance rate. The proposed technique is implemented in Basys‐3 FPGAs within 5% of power and area overhead while maintaining high throughput. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
42. Physical Unclonable Functions based Hardware Obfuscation Techniques: A State of the Art.
- Author
-
Kareem, Husam and Dunaev, Dmitriy
- Subjects
ELECTRONIC equipment ,COMPUTER input-output equipment ,SMART homes ,MEDICAL care ,ROBUST control - Abstract
A clear majority of electronic devices applications used in our daily life require a reliable, secure architecture, e.g., healthcare, social security cards, electronic meters, and smart homes. As a result, many studies are trying to develop appropriate solutions to tackle hardware security threats such as IC piracy, IC overbuilding, reverse engineering, counterfeiting, and tampering. Hardware obfuscation has been introduced as one of the leading robust, low-cost security solutions against different security threats, especially when combined with physical unclonable functions. Considering the inherent irreproducibility of PUFs, this method can provide a high-level security system. However, finding an applicable existent PUF or implementing a new PUF design that meets each hardware obfuscation requirements is not a trivial task. This study reviews and discusses hardware security systems based on PUFs inherited variations and the corresponding hardware obfuscation approaches. [ABSTRACT FROM AUTHOR]
- Published
- 2021
43. BLOcKeR: A Biometric Locking Paradigm for IoT and the Connected Person
- Author
-
Shomaji, Sumaiya, Guo, Zimu, Ganji, Fatemeh, Karimian, Nima, Woodard, Damon, and Forte, Domenic
- Published
- 2021
- Full Text
- View/download PDF
44. Obfuscated AES cryptosystem for secure medical imaging systems in IoMT edge devices
- Author
-
Chhabra, Surbhi and Lata, Kusum
- Published
- 2022
- Full Text
- View/download PDF
45. Security Assessment of High-Level Synthesis
- Author
-
Muttaki, M. Rafid, Pundir, Nitin, Tehranipoor, Mark, Farahmandi, Farimah, and Tehranipoor, Mark, editor
- Published
- 2021
- Full Text
- View/download PDF
46. LifeLine for FPGA Protection: Obfuscated Cryptography for Real-World Security
- Author
-
Florian Stolz, Nils Albartus, Julian Speith, Simon Klix, Clemens Nasenberg, Aiden Gula, Marc Fyrbiak, Christof Paar, Tim Güneysu, and Russell Tessier
- Subjects
FPGA Security ,Hardware Obfuscation ,Software Obfuscation ,Reverse Engineering ,Computer engineering. Computer hardware ,TK7885-7895 ,Information technology ,T58.5-58.64 - Abstract
Over the last decade attacks have repetitively demonstrated that bitstream protection for SRAM-based FPGAs is a persistent problem without a satisfying solution in practice. Hence, real-world hardware designs are prone to intellectual property infringement and malicious manipulation as they are not adequately protected against reverse-engineering. In this work, we first review state-of-the-art solutions from industry and academia and demonstrate their ineffectiveness with respect to reverse-engineering and design manipulation. We then describe the design and implementation of novel hardware obfuscation primitives based on the intrinsic structure of FPGAs. Based on our primitives, we design and implement LifeLine, a hardware design protection mechanism for FPGAs using hardware/software co-obfuscated cryptography. We show that LifeLine offers effective protection for a real-world adversary model, requires minimal integration effort for hardware designers, and retrofits to already deployed (and so far vulnerable) systems.
- Published
- 2021
- Full Text
- View/download PDF
47. A Novel Probability-Based Logic-Locking Technique: ProbLock
- Author
-
Michael Yue and Sara Tehranipoor
- Subjects
hardware security ,logic locking ,hardware obfuscation ,Chemical technology ,TP1-1185 - Abstract
Integrated circuit (IC) piracy and overproduction are serious issues that threaten the security and integrity of a system. Logic locking is a type of hardware obfuscation technique where additional key gates are inserted into the circuit. Only the correct key can unlock the functionality of that circuit; otherwise, the system produces the wrong output. In an effort to hinder these threats on ICs, we have developed a probability-based logic-locking technique to protect the design of a circuit. Our proposed technique, called “ProbLock”, can be applied to both combinational and sequential circuits through a critical selection process. We used a filtering process to select the best location of key gates based on various constraints. Each step in the filtering process generates a subset of nodes for each constraint. We also analyzed the correlation between each constraint and adjusted the strength of the constraints before inserting key gates. We tested our algorithm on 40 benchmarks from the ISCAS ’85 and ISCAS ’89 suites. We evaluated ProbLock against a SAT attack and measured how long the attack took to successfully generate a key value. The SAT attack took longer for most benchmarks using ProbLock which proves viable security in hardware obfuscation.
- Published
- 2021
- Full Text
- View/download PDF
48. Doppelganger Obfuscation — Exploring theDefensive and Offensive Aspects of Hardware Camouflaging
- Author
-
Max Hoffmann and Christof Paar
- Subjects
Hardware Obfuscation ,Camouflaging ,Hardware Trojans ,Computer engineering. Computer hardware ,TK7885-7895 ,Information technology ,T58.5-58.64 - Abstract
Hardware obfuscation is widely used in practice to counteract reverse engineering. In recent years, low-level obfuscation via camouflaged gates has been increasingly discussed in the scientific community and industry. In contrast to classical high-level obfuscation, such gates result in recovery of an erroneous netlist. This technology has so far been regarded as a purely defensive tool. We show that low-level obfuscation is in fact a double-edged sword that can also enable stealthy malicious functionalities. In this work, we present Doppelganger, the first generic design-level obfuscation technique that is based on low-level camouflaging. Doppelganger obstructs central control modules of digital designs, e.g., Finite State Machines (FSMs) or bus controllers, resulting in two different design functionalities: an apparent one that is recovered during reverse engineering and the actual one that is executed during operation. Notably, both functionalities are under the designer’s control. In two case studies, we apply Doppelganger to a universal cryptographic coprocessor. First, we show the defensive capabilities by presenting the reverse engineer with a different mode of operation than the one that is actually executed. Then, for the first time, we demonstrate the considerable threat potential of low-level obfuscation. We show how an invisible, remotely exploitable key-leakage Trojan can be injected into the same cryptographic coprocessor just through obfuscation. In both applications of Doppelganger, the resulting design size is indistinguishable from that of an unobfuscated design, depending on the choice of encodings.
- Published
- 2020
- Full Text
- View/download PDF
49. Obfuscation-Based Secure SoC Design for Protection Against Piracy and Trojan Attacks
- Author
-
Chakraborty, Rajat Subhra, Zheng, Yu, Bhunia, Swarup, Chang, Chip-Hong, editor, and Potkonjak, Miodrag, editor
- Published
- 2016
- Full Text
- View/download PDF
50. 3D/2.5D IC-Based Obfuscation
- Author
-
Xie, Yang, Bao, Chongxi, Srivastava, Ankur, Forte, Domenic, editor, Bhunia, Swarup, editor, and Tehranipoor, Mark M., editor
- Published
- 2017
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.