Abstract
Numerous security threats are emerging from untrusted players in the integrated circuit (IC) ecosystem. Among them, reverse engineering practices with the intent to counterfeit, overproduce, or modify an IC are worrying. In recent years, various techniques have been proposed to mitigate the aforementioned threats but no technique seems to be adequate to hide the hierarchy of a design. Such ability to obfuscate the hierarchy is particularly important for designs that contain repeated modules. In this paper, we propose a novel way to obfuscate such designs by leveraging conventional logic synthesis. We exploit multiple optimizations that are available in the synthesis tool to create design diversity. Our security analysis, performed by using the DANA reverse engineering tool, confirms the significant impact of these optimizations on obfuscation. Among the many considered obfuscated design instances, users can find options that incur very small overheads while still confusing the work of a reverse engineer.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Change history
27 October 2022
In an older version of this paper, there was a spelling error in the name of the corresponding author. It was incorrectly written as “Zail Ul Abideen”. This has been corrected to “Zain Ul Abideen”.
Notes
- 1.
For Cadence Genus, these attributes are lp_insert_clock_gating, auto_ungroup, dp_analytical_opt, br_seq_in_out_phase_opto, max_transition and retime -min_delay, retime -min_area.
References
Albartus, N., Hoffmann, M., Temme, S., Azriel, L., Paar, C.: Dana universal dataflow analysis for gate-level netlist reverse engineering. IACR Trans. Cryptographic Hardware Embedded Syst. 2020(4), 309–336 (2020). https://doi.org/10.13154/tches.v2020.i4.309-336. https://tches.iacr.org/index.php/TCHES/article/view/8685
Becker, G.T., Regazzoni, F., Paar, C., Burleson, W.P.: Stealthy dopant-level hardware trojans. In: Bertoni, G., Coron, J.-S. (eds.) CHES 2013. LNCS, vol. 8086, pp. 197–214. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-40349-1_12
Duarte, J., et al.: Fast inference of deep neural networks in FPGAs for particle physics. J. Instrum. 13(07), P07027 (2018)
Dupuis, S., Flottes, M.L.: Logic locking: a survey of proposed methods and evaluation metrics. J. Electron. Testing 35(3), 273–291 (2019). https://doi.org/10.1007/s10836-019-05800-4. https://hal-lirmm.ccsd.cnrs.fr/lirmm-02128826
Han, Z., Yasin, M., Rajendran, J.J.: Does logic locking work with EDA tools? In: 30th USENIX Security Symposium (USENIX Security 21), pp. 1055–1072. USENIX Association, August 2021. https://www.usenix.org/conference/usenixsecurity21/presentation/han-zhaokun
Hsing, H.: Aes-128 (2013). https://opencores.org/projects/tiny_aes
Meade, T., Zhang, S., Jin, Y.: Netlist reverse engineering for high-level functionality reconstruction. In: 2016 21st Asia and South Pacific Design Automation Conference (ASP-DAC), pp. 655–660 (2016). https://doi.org/10.1109/ASPDAC.2016.7428086
Pagliarini, S., Benites, L., Martins, M., Rech, P., Kastensmidt, F.: Evaluating architectural, redundancy, and implementation strategies for radiation hardening of finfet integrated circuits. IEEE Trans. Nucl. Sci. 68(5), 1045–1053 (2021). https://doi.org/10.1109/TNS.2021.3070643
Rajendran, J., Sinanoglu, O., Karri, R.: Is split manufacturing secure? In: 2013 Design, Automation Test in Europe Conference Exhibition (DATE), pp. 1259–1264 (2013). https://doi.org/10.7873/DATE.2013.261
Roy, J.A., Koushanfar, F., Markov, I.L.: Epic: Ending piracy of integrated circuits. In: 2008 Design, Automation and Test in Europe, pp. 1069–1074 (2008). https://doi.org/10.1109/DATE.2008.4484823
Subramanyan, P., Ray, S., Malik, S.: Evaluating the security of logic encryption algorithms. In: 2015 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), pp. 137–143 (2015). https://doi.org/10.1109/HST.2015.7140252
Sweeney, J., Mohammed Zackriya, V., Pagliarini, S., Pileggi, L.: Latch-based logic locking. In: 2020 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), pp. 132–141 (2020). https://doi.org/10.1109/HOST45689.2020.9300256
Acknowledgements
This work has been partially conducted in the project “ICT programme” which was supported by the European Union through the ESF.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Basiashvili, G., Abideen, Z.U., Pagliarini, S. (2022). Obfuscating the Hierarchy of a Digital IP. In: Orailoglu, A., Reichenbach, M., Jung, M. (eds) Embedded Computer Systems: Architectures, Modeling, and Simulation. SAMOS 2022. Lecture Notes in Computer Science, vol 13511. Springer, Cham. https://doi.org/10.1007/978-3-031-15074-6_19
Download citation
DOI: https://doi.org/10.1007/978-3-031-15074-6_19
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-15073-9
Online ISBN: 978-3-031-15074-6
eBook Packages: Computer ScienceComputer Science (R0)