Hardware Obfuscation for IP Protection of DSP Applications

被引:4
|
作者
Naveenkumar, R. [1 ]
Sivamangai, N. M. [1 ]
Napolean, A. [1 ]
Nissi, G. Akashraj [2 ]
机构
[1] Karunya Inst Technol & Sci, Coimbatore 641114, Tamil Nadu, India
[2] Accenture, Chennai 600063, Tamil Nadu, India
关键词
Hardware security; Digital signal processing (DSP); Hardware obfuscation; Intellectual property (IP) protection; High-level transformations; Structural obfuscation; Functional obfuscation; Two-level security; CIRCUITS; DESIGN; AUTHENTICATION; WATERMARKING; ALGORITHM; FILTERS; DEVICE;
D O I
10.1007/s10836-022-05984-2
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
With an increasing risk of circuit piracy and intellectual property (IP), it is necessary to solve the problem of hardware security in digital signal processing (DSP) via hardware obfuscation. To obscure the circuit at a structural level, a high level of transformation techniques is used. High-level transformations (HLT) not only help in obfuscating the architecture of the circuit, it simultaneously meets the area-speed-power trade-offs. A key-based multiplexer design is proposed for the switch instance, which gives the desired output to the next node only if the configuration key is correct. A single bit change in the key will affect the whole functionality of the design. This key-based multiplexer helps to achieve functional obfuscation. As a result, two-level security is achieved. The objective of this paper is to prevent reverse engineering by structurally and functionally obfuscating the DSP circuit. Implemented and analyzed the area of the obfuscated 3-tap, 5-tap finite impulse response (FIR) filter, and obfuscated infinite impulse response (IIR) filter. Results are compared with those of the non-obfuscated filter circuit. Experimental results show that by applying the high level of transformations, the circuit gets obfuscated. Despite that, the area is reduced. The results confirm that the area of the obfuscated third-order IIR filter design is reduced by 24.56% as compared with its corresponding non-obfuscated filter.
引用
收藏
页码:9 / 20
页数:12
相关论文
共 50 条
  • [1] Hardware Obfuscation for IP Protection of DSP Applications
    Naveenkumar R
    N.M. Sivamangai
    Napolean A
    G. Akashraj Nissi
    Journal of Electronic Testing, 2022, 38 : 9 - 20
  • [2] Comparative Analysis of Hardware Obfuscation for IP Protection
    Amir, Sarah
    Shakya, Bicky
    Forte, Domenic
    Tehranipoor, Mark
    Bhunia, Swarup
    PROCEEDINGS OF THE GREAT LAKES SYMPOSIUM ON VLSI 2017 (GLSVLSI' 17), 2017, : 363 - 368
  • [3] Hardware IP Protection Through Gate-level Obfuscation
    Li, Dongfang
    Liu, Wenchao
    Zou, Xuecheng
    Liu, Zhenglin
    2015 14TH INTERNATIONAL CONFERENCE ON COMPUTER-AIDED DESIGN AND COMPUTER GRAPHICS (CAD/GRAPHICS), 2015, : 186 - 193
  • [4] Obfuscation in DSP algorithms using high level transformations for hardware protection
    Sunumol, K. S.
    Shanu, N.
    PROCEEDINGS OF THE 2015 IEEE RECENT ADVANCES IN INTELLIGENT COMPUTATIONAL SYSTEMS (RAICS), 2015, : 27 - 32
  • [5] LeGO: A Learning-Guided Obfuscation Framework for Hardware IP Protection
    Alaql, Abdulrahman
    Chattopadhyay, Saranyu
    Chakraborty, Prabuddha
    Hoque, Tamzidul
    Bhunia, Swarup
    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2022, 41 (04) : 854 - 867
  • [6] Quality Obfuscation for Error-Tolerant and Adaptive Hardware IP Protection
    Alaql, Abdulrahman
    Hoque, Tamzidul
    Forte, Domenic
    Bhunia, Swarup
    2019 IEEE 37TH VLSI TEST SYMPOSIUM (VTS), 2019,
  • [7] A Low Cost MST-FSM Obfuscation Method for Hardware IP Protection
    Zhang, Yuejun
    Pan, Zhao
    Wang, Pengjun
    Zhang, Xiaowei
    JOURNAL OF CIRCUITS SYSTEMS AND COMPUTERS, 2020, 29 (13)
  • [8] Practical Implementation of Robust State-Space Obfuscation for Hardware IP Protection
    Rahman, Md Moshiur
    Bhunia, Swarup
    IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 2024, 32 (02) : 333 - 346
  • [9] Securing IP Cores for DSP Applications Using Structural Obfuscation and Chromosomal DNA Impression
    Sengupta, Anirban
    Chaurasia, Rahul
    IEEE ACCESS, 2022, 10 : 50903 - 50913
  • [10] RTL Hardware IP Protection Using Key-Based Control and Data Flow Obfuscation
    Chakraborty, Rajat Subhra
    Bhunia, Swarup
    23RD INTERNATIONAL CONFERENCE ON VLSI DESIGN, 2010, : 405 - 410