Skip to main content
Top

2021 | OriginalPaper | Chapter

LIMES: Logic Locking on Interleaved Memory for Enhanced Security

Authors : A. Sai Prasanna, J. Tejeswini, N. Mohankumar

Published in: Computer Networks, Big Data and IoT

Publisher: Springer Singapore

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Globalization and increasing distribution of IC supply chain have resulted in various third parties having a key to precious intellectual property or the physical integrated circuit and therefore information can be exploited. Information security is the practice of safeguarding information by minimizing information risks. It is required to scale down the danger of unauthorized information disclosure, modification, and destruction. Hardware security threats have been observed at several levels of the IC supply chain. To protect the hardware from potential attacks, there are various design-for-security (DFS) techniques. Interleaved memory with logic locking techniques for information security is proposed in this paper. Interleaved memory is a solution for random arrangement and logic locking is needed to interrupt the chain and to protect the data by restricting its access to authorized users. It is a versatile and easy-to-integrate solution that needs only trusted designers. The approach proposed in this paper compares the Hamming distance (HD) and Levenshtein distance (LD) and BER obtained for random logic locking (RLL) and weighted logic locking (WLL) on the interleaved memory. From the results obtained, it can be concluded that weighted logic locking on interleaved memory provides better security.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
2.
go back to reference Raje B, Markam K (2018) Review paper on study of various Interleavers and their significance Raje B, Markam K (2018) Review paper on study of various Interleavers and their significance
3.
go back to reference Torrance R, James D (2009) The state-of-the-art in IC reverse engineering. In: Clavier C, Gaj K (eds) Cryptographic hardware and embedded systems—CHES 2009. CHES 2009. Lecture notes in computer science, vol 5747. Springer, Berlin, Heidelberg Torrance R, James D (2009) The state-of-the-art in IC reverse engineering. In: Clavier C, Gaj K (eds) Cryptographic hardware and embedded systems—CHES 2009. CHES 2009. Lecture notes in computer science, vol 5747. Springer, Berlin, Heidelberg
5.
go back to reference Yasin M, Rajendran J, Sinanoglu O (2020) The need for logic locking. In: Trustworthy hardware design: combinational logic locking techniques. Analog circuits and signal processing. Springer, Cham Yasin M, Rajendran J, Sinanoglu O (2020) The need for logic locking. In: Trustworthy hardware design: combinational logic locking techniques. Analog circuits and signal processing. Springer, Cham
6.
go back to reference Sengupta A, Mazumdar B, Yasin M, Sinanoglu O (2020) Logic locking with provable security against power analysis attacks. IEEE Trans Comput Aided Des Integr Circ Syst 39(4):766–778CrossRef Sengupta A, Mazumdar B, Yasin M, Sinanoglu O (2020) Logic locking with provable security against power analysis attacks. IEEE Trans Comput Aided Des Integr Circ Syst 39(4):766–778CrossRef
7.
go back to reference Massad MEl, Zhang J, Garg S, Tripunitara MV (2017) Logic locking for secure outsourced chip fabrication: a new attack and provably secure defense mechanism. arXiv preprint arXiv:1703.10187 Massad MEl, Zhang J, Garg S, Tripunitara MV (2017) Logic locking for secure outsourced chip fabrication: a new attack and provably secure defense mechanism. arXiv preprint arXiv:​1703.​10187
8.
go back to reference Dupuis S, Ba P, Di Natale G, Flottes M, Rouzeyre B (2014) A novel hardware logic encryption technique for thwarting illegal overproduction and Hardware Trojans. In: 2014 IEEE 20th ınternational on-line testing symposium (IOLTS), Platja d’Aro, Girona, pp 49–54 Dupuis S, Ba P, Di Natale G, Flottes M, Rouzeyre B (2014) A novel hardware logic encryption technique for thwarting illegal overproduction and Hardware Trojans. In: 2014 IEEE 20th ınternational on-line testing symposium (IOLTS), Platja d’Aro, Girona, pp 49–54
9.
10.
go back to reference Guin U, Huang K, DiMase D, Carulli JM, Tehranipoor M, Makris Y (2014) Counterfeit ıntegrated circuits: a rising threat in the global semiconductor supply chain. Proc IEEE 102(8):1207–1228CrossRef Guin U, Huang K, DiMase D, Carulli JM, Tehranipoor M, Makris Y (2014) Counterfeit ıntegrated circuits: a rising threat in the global semiconductor supply chain. Proc IEEE 102(8):1207–1228CrossRef
11.
go back to reference Yasin M, Rajendran JJ, Sinanoglu O, Karri R (2016) On ımproving the security of logic locking. IEEE Trans Comput Aided Des Integr Circ Syst 35(9):1411–1424CrossRef Yasin M, Rajendran JJ, Sinanoglu O, Karri R (2016) On ımproving the security of logic locking. IEEE Trans Comput Aided Des Integr Circ Syst 35(9):1411–1424CrossRef
12.
go back to reference Yasin M, Mazumdar B, Rajendran J, Sinanoglu O (2019) Hardware security and trust: logic locking as a design-for-trust solution. In: Elfadel I, Ismail M (eds) The IoT physical layer. Springer, Cham Yasin M, Mazumdar B, Rajendran J, Sinanoglu O (2019) Hardware security and trust: logic locking as a design-for-trust solution. In: Elfadel I, Ismail M (eds) The IoT physical layer. Springer, Cham
13.
go back to reference Upadhyaya B, Sanyal S (2009) VHDL modeling of convolutional ınterleaver–deinterleaver for efficient FPGA implementation. Int J Recent Trends Eng 2. LETTERS Upadhyaya B, Sanyal S (2009) VHDL modeling of convolutional ınterleaver–deinterleaver for efficient FPGA implementation. Int J Recent Trends Eng 2. LETTERS
15.
go back to reference Chen JIZ (2020) Smart security system for suspicious activity detection in volatile areas. J Inform Technol 2(1):64–72 Chen JIZ (2020) Smart security system for suspicious activity detection in volatile areas. J Inform Technol 2(1):64–72
16.
17.
18.
go back to reference Rekha S, Reshma B, Dilipkumar NP, Crocier AA, Mohankumar N (2020) Logically locked I2C protocol for ımproved security. In: Bindhu V, Chen J, Tavares J (eds) International conference on communication, computing and electronics systems. Lecture notes in electrical engineering, vol 637. Springer, Singapore. https://doi.org/10.1007/978-981-15-2612-1_67 Rekha S, Reshma B, Dilipkumar NP, Crocier AA, Mohankumar N (2020) Logically locked I2C protocol for ımproved security. In: Bindhu V, Chen J, Tavares J (eds) International conference on communication, computing and electronics systems. Lecture notes in electrical engineering, vol 637. Springer, Singapore. https://​doi.​org/​10.​1007/​978-981-15-2612-1_​67
Metadata
Title
LIMES: Logic Locking on Interleaved Memory for Enhanced Security
Authors
A. Sai Prasanna
J. Tejeswini
N. Mohankumar
Copyright Year
2021
Publisher
Springer Singapore
DOI
https://doi.org/10.1007/978-981-16-0965-7_46