Skip to main content

IP Trust: The Problem and Design/Validation-Based Solution

  • Chapter
  • First Online:
Fundamentals of IP and SoC Security

Abstract

Globalization of the integrated circuit (IC) supply chain has raised security vulnerabilities at various stages of the IC design flow. Due to increasing demand for products, companies are trying to reduce the time-to-market (TTM) of ICs which, combined with the increased design complexity, boosts the intellectual property (IP) cores transaction market, and supports the growth of third-party design houses. Meanwhile, the exorbitant cost of in-house chip manufacturing and testing forces companies to outsource these services to foundries and third-party testing facilities. The use of third-party IPs and the outsourcing of fabrication and testing services have raised security concerns, thereby compelling companies to evaluate trustworthiness of their circuit designs. Many defense mechanisms have been proposed to protect IP/IC from reverse engineering, malicious tampering, piracy, counterfeiting, cloning, and overbuilding. In this chapter, we first illustrate different threats to an IP/IC as well as locations of possible adversaries in the supply chain. Subsequently, we discuss different protection methods for soft and firm IP cores. Among the two categories of protection methods, authentication, and prevention, we explain the prevention methods in greater details. We divide the prevention methods into combinational logic locking/encryption and finite state machine locking/encryption. Methods for protecting field-programmable gate array (FPGA) bitstreams are also included in the chapter. We then discuss various IP certification methods, which are used to ensure trustworthiness of IPs. Two main categories of formal methods are particularly elaborated within the scope of IP certification: theorem proving and equivalence checking.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 79.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 99.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 139.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Kocher, P.: Advances in Cryptology (CRYPTO’96). Lecture Notes in Computer Science, vol. 1109, pp. 104–113 (1996)

    Google Scholar 

  2. Kocher, P., Jaffe, J., Jun, B.: Advances in Cryptology–CRYPTO’99, pp. 789–789 (1999)

    Google Scholar 

  3. Quisquater, J.J., Samyde, D.: Smart Card Programming and Security. Lecture Notes in Computer Science, vol. 2140, pp. 200–210 (2001)

    Google Scholar 

  4. Gandolfi, K., Mourtel, C., Olivier, F.: Cryptographic Hardware and Embedded Systems (CHES) 2001. Lecture Notes in Computer Science, vol. 2162, pp. 251–261 (2001)

    Google Scholar 

  5. Chari, S., Rao, J.R., Rohatgi, P.: Cryptographic Hardware and Embedded Systems—Ches 2002. Lecture Notes in Computer Science, vol. 2523, pp. 13–28. Springer, Berlin (2002)

    Google Scholar 

  6. Messerges, T.S., Dabbish, E.A., Sloan, R.H.: IEEE Trans. Comput. 51(5), 541 (2002)

    Google Scholar 

  7. Tiri, K., Akmal, M., Verbauwhede, I.: Solid-State Circuits Conference, 2002. ESSCIRC 2002. Proceedings of the 28th European, pp. 403–406 (2002)

    Google Scholar 

  8. Fan, Y.C., Tsao, H.W.: Electr. Lett. 39(18), 1316 (2003)

    Google Scholar 

  9. Torunoglu, I., Charbon, E.: IEEE J. Solid-State Circuits 35(3), 434 (2000)

    Google Scholar 

  10. Kahng, A.B., Lach, J., Mangione-Smith, W.H., Mantik, S., Markov, I.L., Potkonjak, M., Tucker, P., Wang, H., Wolfe, G.: IEEE Trans. Comput.-Aided Des. Integr. Circuits Syst. 20(10), 1236 (2001)

    Google Scholar 

  11. Lach, J., Mangione-Smith, W.H., Potkonjak, M.: IEEE Trans. Comput.-Aided Des. Integr. Circuits Syst. 20(10), 1253 (2001)

    Google Scholar 

  12. Qu, G., Potkonjak, M.: Proceedings of the 37th Annual Design Automation Conference, pp. 587–592 (2000)

    Google Scholar 

  13. Chang, C.H., Zhang, L.: IEEE Trans. Comput.-Aided Des. Integr. Circuits Syst. 33(1), 76 (2014)

    Google Scholar 

  14. Roy, F.K.J.A., Markov, I.L.: Design, Automation and Test in Europe (DATE), vol. 1 (2008)

    Google Scholar 

  15. Rajendran, J., Pino, Y., Sinanoglu, O., Karri, R.: Design Automation Conference (DAC), 2012 49th ACM/EDAC/IEEE, pp. 83–89 (2012)

    Google Scholar 

  16. Rajendran, J., Pino, Y., Sinanoglu, O., Karri, R.: Design, Automation Test in Europe Conference Exhibition (DATE), vol. 2012, pp. 953–958 (2012). doi:10.1109/DATE.2012.6176634

  17. Rajendran, J., Zhang, H., Zhang, C., Rose, G., Pino, Y., Sinanoglu, O., Karri, R.: IEEE Trans. Comput. 99 (2013)

    Google Scholar 

  18. Dupuis, S., Ba, P.S., Natale, G.D., Flottes, M.L., Rouzeyre, B.: Conference on IEEE 20th International On-Line Testing Symposium (IOLTS), IOLTS ’14, pp. 49–54 (2014)

    Google Scholar 

  19. Chakraborty, R., Bhunia, S.: IEEE/ACM International Conference on Computer-Aided Design 2008. ICCAD 2008, pp. 674–677 (2008). doi:10.1109/ICCAD.2008.4681649

  20. Chakraborty, R., Bhunia, S.: IEEE Trans. Comput.-Aided Des. Integr. Circuits Syst. 28(10), 1493 (2009). doi:10.1109/TCAD.2009.2028166

  21. Chakraborty, R.S., Bhunia, S.: J. Electr. Test. 27(6), 767 (2011). doi:10.1007/s10836-011-5255-2

  22. Chakraborty, R., Bhunia, S.: IEEE/ACM International Conference on Computer-Aided Design—Digest of Technical Papers, 2009. ICCAD 2009, pp. 113–116 (2009)

    Google Scholar 

  23. Narasimhan, S., Chakraborty, R., Bhunia, S.: IEEE Des. Test Comput. 99(PrePrints) (2011). http://doi.ieeecomputersociety.org/10.1109/MDT.2011.70

  24. Desai, A.R., Hsiao, M.S., Wang, C., Nazhandali, L., Hall, S.: Proceedings of the Eighth Annual Cyber Security and Information Intelligence Research Workshop, CSIIRW ’13, pp. 8:1–8:4. ACM, New York (2013). doi:10.1145/2459976.2459985

  25. Li, L., Zhou, H.: 2013 IEEE International Symposium on Hardware-Oriented Security and Trust, HOST 2013, Austin, TX, USA, June 2–3, pp. 55–60 (2013). doi:10.1109/HST.2013.6581566

  26. Chakraborty, R., Bhunia, S.: 23rd International Conference on VLSI Design, 2010. VLSID’10, pp. 405–410 (2010). doi:10.1109/VLSI.Design.2010.54

  27. Chakraborty, R., Bhunia, S.: IEEE International Workshop on Hardware-Oriented Security and Trust, 2009. HOST ’09, pp. 96–99 (2009). doi:10.1109/HST.2009.5224963

  28. Alkabani, Y., Koushanfar, E.: USENIX Security, pp. 291–306 (2007)

    Google Scholar 

  29. Liu, B., Wang, B.: Design. Automation and Test in Europe Conference and Exhibition (DATE), pp. 1–6 (2014). doi:10.7873/DATE.2014.256

  30. Wendt, J.B., Potkonjak, M.: Proceedings of the 2014 IEEE/ACM International Conference on Computer-Aided Design, ICCAD’14, pp. 270–277. IEEE Press, Piscataway (2014). http://dl.acm.org/citation.cfm?id=2691365.2691419

  31. Lao, Y., Parhi, K.: IEEE Trans. Very Large Scale Integr. (VLSI) Syst. 99, 1 (2014). doi:10.1109/TVLSI.2014.2323976

  32. Natale, G.D., Dupuis, S., Flottes, M.L., Rouzeyre, B.: Workshop on Trustworthy Manufacturing and Utilization of Secure Devices (TRUDEVICE13) (2013)

    Google Scholar 

  33. Maes, R., Schellekens, D., Verbauwhede, I.: IEEE Trans. Inf. Forensics Secur. 7(1), 98 (2012)

    Google Scholar 

  34. Zhang, L., Chang, C.H.: IEEE Trans. Inf. Forensics Secur. 9(11), 1893 (2014)

    Google Scholar 

  35. Guneysu, T., Moller, B., Paar, C.: IEEE International Conference on Field-Programmable Technology, ICFPT, pp. 169–176 (2007)

    Google Scholar 

  36. Drimer, S., Güneysu, T., Kuhn, M.G., Paar, C.: (2008). http://www.cl.cam.ac.uk/sd410/

  37. Wolff, E., Papachristou, C., Bhunia, S., Chakraborty, R.S.: IEEE Design Automation and Test in Europe, pp. 1362–1365 (2008)

    Google Scholar 

  38. Banga, M., Hsiao, M.: IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), pp. 56–59 (2010)

    Google Scholar 

  39. Hicks, M., Finnicum, M., King, S.T., Martin, M.M.K., Smith, J.M.: Proceedings of IEEE Symposium on Security and Privacy, pp. 159–172 (2010)

    Google Scholar 

  40. Sturton, C., Hicks, M., Wagner, D., King, S.: 2011 IEEE Symposium on Security and Privacy (SP), pp. 64–77 (2011)

    Google Scholar 

  41. Zhang, X., Tehranipoor, M.: 2011 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), pp. 67–70 (2011)

    Google Scholar 

  42. Love, E., Jin, Y., Makris, Y.: IEEE Trans. Inf. Forensics Secur. 7(1), 25 (2012)

    Google Scholar 

  43. Jin, Y., Yang, B., Makris, Y.: IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), pp. 99–106 (2013)

    Google Scholar 

  44. Jin, Y.: IEEE Computer Society Annual Symposium on VLSI (ISVLSI) (2014)

    Google Scholar 

  45. INRIA: The coq proof assistant (2010). http://coq.inria.fr/

  46. Guo, X., Dutta, R.G., Jin, Y., Farahmandi, F., Mishra, P.: Design Automation Conference (DAC), 2015 52nd ACM/EDAC/IEEE (2015) (To appear)

    Google Scholar 

  47. Love, E., Jin, Y., Makris, Y.: 2011 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), pp. 12–17 (2011)

    Google Scholar 

  48. Drzevitzky, S., Kastens, U., Platzner, M.: International Conference on Reconfigurable Computing and FPGAs, pp. 189–194 (2009)

    Google Scholar 

  49. Drzevitzky, S.: International Conference on Field Programmable Logic and Applications, pp. 255–258 (2010)

    Google Scholar 

  50. Necula, G.C.: POPL’97: Proceedings of the 24th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, pp. 106–119 (1997)

    Google Scholar 

  51. Drzevitzky, S., Platzner, M.: 6th International Workshop on Reconfigurable Communication-Centric Systems-on-Chip, pp. 1–8 (2011)

    Google Scholar 

  52. Drzevitzky, S., Kastens, U., Platzner, M.: Int. J. Reconfig. Comput. 2010 (2010)

    Google Scholar 

  53. Yang, B., Wu, K., Karri, R.: Test Conference, 2004. Proceedings. ITC 2004. International, pp. 339–344 (2004)

    Google Scholar 

  54. Nara, R., Togawa, N., Yanagisawa, M., Ohtsuki, T.: Proceedings of the 2010 Asia and South Pacific Design Automation Conference, pp. 407–412 (2010)

    Google Scholar 

  55. Yang, B., Wu, K., Karri, R.: IEEE Trans. Comput.-Aided Des. Integr. Circuits Syst. 25(10), 2287 (2006)

    Google Scholar 

  56. Sengar, G., Mukhopadhyay, D., Chowdhury, D.: IEEE Trans. Comput.-Aided Des. Integr. Circuits Syst. 26(11), 2080 (2007)

    Google Scholar 

  57. Da Rolt, J., Di Natale, G., Flottes, M.L., Rouzeyre, B.: 2012 IEEE 30th VLSI Test Symposium (VTS), pp. 246–251 (2012)

    Google Scholar 

  58. Rolt, J., Das, A., Natale, G., Flottes, M.L., Rouzeyre, B., Verbauwhede, I.: Constructive Side-Channel Analysis and Secure Design. In: Schindler, W., Huss, S. (eds.) Lecture Notes on Computer Science, vol. 7275, pp. 89–104. Springer, Berlin (2012)

    Google Scholar 

Download references

Acknowledgements

This work was supported in part by the National Science Foundation (CNS-1319105).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Raj Gautam Dutta .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this chapter

Cite this chapter

Dutta, R.G., Guo, X., Jin, Y. (2017). IP Trust: The Problem and Design/Validation-Based Solution. In: Bhunia, S., Ray, S., Sur-Kolay, S. (eds) Fundamentals of IP and SoC Security. Springer, Cham. https://doi.org/10.1007/978-3-319-50057-7_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-50057-7_4

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-50055-3

  • Online ISBN: 978-3-319-50057-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics