Hardware Obfuscation for IP Protection of DSP Applications

被引:4
|
作者
Naveenkumar, R. [1 ]
Sivamangai, N. M. [1 ]
Napolean, A. [1 ]
Nissi, G. Akashraj [2 ]
机构
[1] Karunya Inst Technol & Sci, Coimbatore 641114, Tamil Nadu, India
[2] Accenture, Chennai 600063, Tamil Nadu, India
关键词
Hardware security; Digital signal processing (DSP); Hardware obfuscation; Intellectual property (IP) protection; High-level transformations; Structural obfuscation; Functional obfuscation; Two-level security; CIRCUITS; DESIGN; AUTHENTICATION; WATERMARKING; ALGORITHM; FILTERS; DEVICE;
D O I
10.1007/s10836-022-05984-2
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
With an increasing risk of circuit piracy and intellectual property (IP), it is necessary to solve the problem of hardware security in digital signal processing (DSP) via hardware obfuscation. To obscure the circuit at a structural level, a high level of transformation techniques is used. High-level transformations (HLT) not only help in obfuscating the architecture of the circuit, it simultaneously meets the area-speed-power trade-offs. A key-based multiplexer design is proposed for the switch instance, which gives the desired output to the next node only if the configuration key is correct. A single bit change in the key will affect the whole functionality of the design. This key-based multiplexer helps to achieve functional obfuscation. As a result, two-level security is achieved. The objective of this paper is to prevent reverse engineering by structurally and functionally obfuscating the DSP circuit. Implemented and analyzed the area of the obfuscated 3-tap, 5-tap finite impulse response (FIR) filter, and obfuscated infinite impulse response (IIR) filter. Results are compared with those of the non-obfuscated filter circuit. Experimental results show that by applying the high level of transformations, the circuit gets obfuscated. Despite that, the area is reduced. The results confirm that the area of the obfuscated third-order IIR filter design is reduced by 24.56% as compared with its corresponding non-obfuscated filter.
引用
收藏
页码:9 / 20
页数:12
相关论文
共 50 条
  • [21] Reconfigurable DSP IP for multimedia applications
    Martina, M
    Masera, G
    Piccinini, G
    Vacca, F
    Zamboni, M
    2002 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, VOLS I-IV, PROCEEDINGS, 2002, : 4179 - 4179
  • [22] HARPOON: An Obfuscation-Based SoC Design Methodology for Hardware Protection
    Chakraborty, Rajat Subhra
    Bhunia, Swarup
    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2009, 28 (10) : 1493 - 1502
  • [23] HARPOON: An obfuscation-based SoC design methodology for hardware protection
    Chakraborty, Rajat Subhra
    Bhunia, Swarup
    IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2009, 28 (01) : 1493 - 1502
  • [24] Circuit Camouflage Integration for Hardware IP Protection
    Cocchi, Ronald P.
    Baukus, James P.
    Chow, Lap Wai
    Wang, Bryan J.
    2014 51ST ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2014,
  • [25] DSP Design Protection in CE through Algorithmic Transformation Based Structural Obfuscation
    Sengupta, Anirban
    Roy, Dipanjan
    Mohanty, Saraju P.
    Corcoran, Peter
    IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2017, 63 (04) : 467 - 476
  • [26] IP protection of DSP algorithms for system on chip implementation
    Chapman, R
    Durrani, TS
    IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2000, 48 (03) : 854 - 861
  • [27] Hardware Obfuscation of AES IP Core Using PUFs and PRNG: A Secure Cryptographic Key Generation Solution for Internet-of-Things Applications
    Chhabra S.
    Lata K.
    SN Computer Science, 3 (4)
  • [28] IP Protection and Supply Chain Security through Logic Obfuscation: A Systematic Overview
    Shamsi, Kaveh
    Li, Meng
    Plaks, Kenneth
    Fazzari, Saverio
    Pan, David Z.
    Jin, Yier
    ACM TRANSACTIONS ON DESIGN AUTOMATION OF ELECTRONIC SYSTEMS, 2019, 24 (06)
  • [29] On automating delayered IC analysis for hardware IP protection
    Sarkar, Esha
    Maniatakos, Michail
    INTERNATIONAL CONFERENCE ON OMNI-LAYER INTELLIGENT SYSTEMS (COINS), 2019, : 205 - 210
  • [30] On automating delayered IC analysis for hardware IP protection
    Sarkar, Esha
    Maniatakos, Michail
    ACM International Conference Proceeding Series, 2019, Part F148162 : 205 - 210