Hardware IP Protection Through Gate-level Obfuscation

被引:8
|
作者
Li, Dongfang [1 ]
Liu, Wenchao [1 ]
Zou, Xuecheng [1 ]
Liu, Zhenglin [1 ]
机构
[1] Huazhong Univ Sci & Technol, Sch Opt & Elect Informat, Wuhan, Peoples R China
关键词
Hardware IP; Physical Unclonable Function; Obfuscation; Gate-level;
D O I
10.1109/CADGRAPHICS.2015.39
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Hardware Intellectual Property (IP) cores have emerged as an integral part of modern System-on-Chip (SoC) designs. However, recent trends of reverse engineering pose major threat to IP-based SOC design flow. The paper proposes a novel approach for hardware IP protection using gate-level obfuscation, which could make design less intelligible in order to neutralize or weaken the effect of reverse engineering. The basic idea is to hide the original logic function by using Physical Unclonable Function (PUF), multiplexer and configurable logic, so that it is difficult for reverse engineering attackers to get complete information of circuit netlist. The design methodology could be applied in combinational logic and sequential logic. Simulation results on several IP cores show that we can achieve high levels of security through a well-formulated obfuscation scheme at less than 10% area overhead under delay constraint.
引用
收藏
页码:186 / 193
页数:8
相关论文
共 50 条
  • [21] A logic obfuscation attack method based on gate-level information flow tracing techniques
    Liu L.
    Zhu J.
    Zhang Z.
    Shen L.
    Sun Y.
    Mu D.
    Xibei Gongye Daxue Xuebao/Journal of Northwestern Polytechnical University, 2024, 42 (01): : 78 - 83
  • [22] FIGHT-Metric: Functional Identification of Gate-Level Hardware Trustworthiness
    Sullivan, Dean
    Biggers, Jeff
    Zhu, Guidong
    Zhang, Shaojie
    Jin, Yier
    2014 51ST ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2014,
  • [23] Hardware Trojan Detection for Gate-Level Netlists Based on Multidimensional Features
    Li, Linyuan
    Xu, Jinfu
    Yan, Yingjian
    Zhao, Conghui
    Liu, Yanjiang
    Computer Engineering and Applications, 2023, 59 (18) : 278 - 284
  • [24] Detecting Hardware Trojans with Gate-Level Information-Flow Tracking
    Hu, Wei
    Mao, Baolei
    Oberg, Jason
    Kastner, Ryan
    COMPUTER, 2016, 49 (08) : 44 - 52
  • [25] Circuit enclaves susceptible to hardware Trojans insertion at gate-level designs
    Sebt, Seyed Mohammad
    Patooghy, Ahmad
    Beitollahi, Hakem
    Kinsy, Michel
    IET COMPUTERS AND DIGITAL TECHNIQUES, 2018, 12 (06): : 251 - 257
  • [26] Hardware Trojans classification based on controllability and observability in gate-level netlist
    Xie, Xin
    Sun, Yangyang
    Chen, Hongda
    Ding, Yong
    IEICE ELECTRONICS EXPRESS, 2017, 14 (18):
  • [27] Hardware Trojan Detection with Linear Regression Based Gate-Level Characterization
    Zhang, Li
    Chang, Chip-Hong
    2014 IEEE ASIA PACIFIC CONFERENCE ON CIRCUITS AND SYSTEMS (APCCAS), 2014, : 256 - 259
  • [28] Hardware Trojans Classification for Gate-level Netlists based on Machine Learning
    Hasegawa, Kento
    Oya, Masaru
    Yanagisawa, Masao
    Togawa, Nozomu
    2016 IEEE 22ND INTERNATIONAL SYMPOSIUM ON ON-LINE TESTING AND ROBUST SYSTEM DESIGN (IOLTS), 2016, : 203 - 206
  • [29] Adversarial Examples for Hardware-Trojan Detection at Gate-Level Netlists
    Nozawa, Kohei
    Hasegawa, Kento
    Hidano, Seira
    Kiyomoto, Shinsaku
    Hashimoto, Kazuo
    Togawa, Nozomu
    COMPUTER SECURITY, ESORICS 2019, 2020, 11980 : 341 - 359
  • [30] An evolutionary robot navigation system using a gate-level evolvable hardware
    Keymeulen, D
    Durantez, M
    Konaka, K
    Kuniyoshi, Y
    Higuchi, T
    EVOLVABLE SYSTEMS: FROM BIOLOGY TO HARDWARE, 1997, 1259 : 195 - 209