Skip to main content

Obfuscating the Hierarchy of a Digital IP

  • Conference paper
  • First Online:
Embedded Computer Systems: Architectures, Modeling, and Simulation (SAMOS 2022)

Abstract

Numerous security threats are emerging from untrusted players in the integrated circuit (IC) ecosystem. Among them, reverse engineering practices with the intent to counterfeit, overproduce, or modify an IC are worrying. In recent years, various techniques have been proposed to mitigate the aforementioned threats but no technique seems to be adequate to hide the hierarchy of a design. Such ability to obfuscate the hierarchy is particularly important for designs that contain repeated modules. In this paper, we propose a novel way to obfuscate such designs by leveraging conventional logic synthesis. We exploit multiple optimizations that are available in the synthesis tool to create design diversity. Our security analysis, performed by using the DANA reverse engineering tool, confirms the significant impact of these optimizations on obfuscation. Among the many considered obfuscated design instances, users can find options that incur very small overheads while still confusing the work of a reverse engineer.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 79.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 99.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

Change history

  • 27 October 2022

    In an older version of this paper, there was a spelling error in the name of the corresponding author. It was incorrectly written as “Zail Ul Abideen”. This has been corrected to “Zain Ul Abideen”.

Notes

  1. 1.

    For Cadence Genus, these attributes are lp_insert_clock_gating, auto_ungroup, dp_analytical_opt, br_seq_in_out_phase_opto, max_transition and retime -min_delay, retime -min_area.

References

  1. Albartus, N., Hoffmann, M., Temme, S., Azriel, L., Paar, C.: Dana universal dataflow analysis for gate-level netlist reverse engineering. IACR Trans. Cryptographic Hardware Embedded Syst. 2020(4), 309–336 (2020). https://doi.org/10.13154/tches.v2020.i4.309-336. https://tches.iacr.org/index.php/TCHES/article/view/8685

  2. Becker, G.T., Regazzoni, F., Paar, C., Burleson, W.P.: Stealthy dopant-level hardware trojans. In: Bertoni, G., Coron, J.-S. (eds.) CHES 2013. LNCS, vol. 8086, pp. 197–214. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-40349-1_12

    Chapter  Google Scholar 

  3. Duarte, J., et al.: Fast inference of deep neural networks in FPGAs for particle physics. J. Instrum. 13(07), P07027 (2018)

    Google Scholar 

  4. Dupuis, S., Flottes, M.L.: Logic locking: a survey of proposed methods and evaluation metrics. J. Electron. Testing 35(3), 273–291 (2019). https://doi.org/10.1007/s10836-019-05800-4. https://hal-lirmm.ccsd.cnrs.fr/lirmm-02128826

  5. Han, Z., Yasin, M., Rajendran, J.J.: Does logic locking work with EDA tools? In: 30th USENIX Security Symposium (USENIX Security 21), pp. 1055–1072. USENIX Association, August 2021. https://www.usenix.org/conference/usenixsecurity21/presentation/han-zhaokun

  6. Hsing, H.: Aes-128 (2013). https://opencores.org/projects/tiny_aes

  7. Meade, T., Zhang, S., Jin, Y.: Netlist reverse engineering for high-level functionality reconstruction. In: 2016 21st Asia and South Pacific Design Automation Conference (ASP-DAC), pp. 655–660 (2016). https://doi.org/10.1109/ASPDAC.2016.7428086

  8. Pagliarini, S., Benites, L., Martins, M., Rech, P., Kastensmidt, F.: Evaluating architectural, redundancy, and implementation strategies for radiation hardening of finfet integrated circuits. IEEE Trans. Nucl. Sci. 68(5), 1045–1053 (2021). https://doi.org/10.1109/TNS.2021.3070643

    Article  Google Scholar 

  9. Rajendran, J., Sinanoglu, O., Karri, R.: Is split manufacturing secure? In: 2013 Design, Automation Test in Europe Conference Exhibition (DATE), pp. 1259–1264 (2013). https://doi.org/10.7873/DATE.2013.261

  10. Roy, J.A., Koushanfar, F., Markov, I.L.: Epic: Ending piracy of integrated circuits. In: 2008 Design, Automation and Test in Europe, pp. 1069–1074 (2008). https://doi.org/10.1109/DATE.2008.4484823

  11. Subramanyan, P., Ray, S., Malik, S.: Evaluating the security of logic encryption algorithms. In: 2015 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), pp. 137–143 (2015). https://doi.org/10.1109/HST.2015.7140252

  12. Sweeney, J., Mohammed Zackriya, V., Pagliarini, S., Pileggi, L.: Latch-based logic locking. In: 2020 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), pp. 132–141 (2020). https://doi.org/10.1109/HOST45689.2020.9300256

Download references

Acknowledgements

This work has been partially conducted in the project “ICT programme” which was supported by the European Union through the ESF.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zain Ul Abideen .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Basiashvili, G., Abideen, Z.U., Pagliarini, S. (2022). Obfuscating the Hierarchy of a Digital IP. In: Orailoglu, A., Reichenbach, M., Jung, M. (eds) Embedded Computer Systems: Architectures, Modeling, and Simulation. SAMOS 2022. Lecture Notes in Computer Science, vol 13511. Springer, Cham. https://doi.org/10.1007/978-3-031-15074-6_19

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-15074-6_19

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-15073-9

  • Online ISBN: 978-3-031-15074-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics