Skip to main content
Erschienen in: Journal of Electronic Testing 1/2022

14.03.2022

Hardware Obfuscation for IP Protection of DSP Applications

verfasst von: Naveenkumar R, N.M. Sivamangai, Napolean A, G. Akashraj Nissi

Erschienen in: Journal of Electronic Testing | Ausgabe 1/2022

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

With an increasing risk of circuit piracy and intellectual property (IP), it is necessary to solve the problem of hardware security in digital signal processing (DSP) via hardware obfuscation. To obscure the circuit at a structural level, a high level of transformation techniques is used. High-level transformations (HLT) not only help in obfuscating the architecture of the circuit, it simultaneously meets the area-speed-power trade-offs. A key-based multiplexer design is proposed for the switch instance, which gives the desired output to the next node only if the configuration key is correct. A single bit change in the key will affect the whole functionality of the design. This key-based multiplexer helps to achieve functional obfuscation. As a result, two-level security is achieved. The objective of this paper is to prevent reverse engineering by structurally and functionally obfuscating the DSP circuit. Implemented and analyzed the area of the obfuscated 3-tap, 5-tap finite impulse response (FIR) filter, and obfuscated infinite impulse response (IIR) filter. Results are compared with those of the non-obfuscated filter circuit. Experimental results show that by applying the high level of transformations, the circuit gets obfuscated. Despite that, the area is reduced. The results confirm that the area of the obfuscated third-order IIR filter design is reduced by 24.56% as compared with its corresponding non-obfuscated filter.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Weitere Produktempfehlungen anzeigen
Literatur
3.
Zurück zum Zitat Alkabani Y, Koushanfar F (2007) “Active Hardware Metering for Intellectual Property Protection and Security.” USENIX Security Symposium 291–306 Alkabani Y, Koushanfar F (2007) “Active Hardware Metering for Intellectual Property Protection and Security.” USENIX Security Symposium 291–306
5.
Zurück zum Zitat Baluprithviraj KN, Vijayachitra S (2020) Optimization of Logic Obfuscation Technique for Hardware Security. Int J Sci Technol Res 9:1044–1048 Baluprithviraj KN, Vijayachitra S (2020) Optimization of Logic Obfuscation Technique for Hardware Security. Int J Sci Technol Res 9:1044–1048
17.
Zurück zum Zitat Methodology for protection and Licensing of HDL IP by Tarun Batra, Cadence Design Systems, Inc. Noida, India Methodology for protection and Licensing of HDL IP by Tarun Batra, Cadence Design Systems, Inc. Noida, India
23.
Zurück zum Zitat Parhi KK, Messerschmitt DG (1989) “Pipeline interleaving and parallelism in recursive digital filters. I. Pipelining using scattered look-ahead and decomposition,” IEEE Transactions on Acoustics, Speech, and Signal Processing. 37(7):1099–1117. https://doi.org/10.1109/29.32286 Parhi KK, Messerschmitt DG (1989) “Pipeline interleaving and parallelism in recursive digital filters. I. Pipelining using scattered look-ahead and decomposition,” IEEE Transactions on Acoustics, Speech, and Signal Processing. 37(7):1099–1117. https://​doi.​org/​10.​1109/​29.​32286
28.
Zurück zum Zitat Sengupta A, Rathor M (2020) "Enhanced Security of DSP Circuits Using Multi-Key Based Structural Obfuscation and Physical-Level Watermarking for Consumer Electronics Systems," in IEEE Transactions on Consumer Electronics, 66(2): 163–172. https://doi.org/10.1109/TCE.2020.2972808 Sengupta A, Rathor M (2020) "Enhanced Security of DSP Circuits Using Multi-Key Based Structural Obfuscation and Physical-Level Watermarking for Consumer Electronics Systems," in IEEE Transactions on Consumer Electronics, 66(2): 163–172. https://​doi.​org/​10.​1109/​TCE.​2020.​2972808
31.
Zurück zum Zitat Shamsi K, Li M, Plaks K, Fazzari S, Pan DZ, Jin Y (2019) “IP Protection and Supply Chain Security through Logic Obfuscation.” ACM Trans Design Automation of Electronic Sys 24(6):1–36. https://doi.org/10.1145/3342099 Shamsi K, Li M, Plaks K, Fazzari S, Pan DZ, Jin Y (2019) “IP Protection and Supply Chain Security through Logic Obfuscation.” ACM Trans Design Automation of Electronic Sys 24(6):1–36. https://​doi.​org/​10.​1145/​3342099
32.
Zurück zum Zitat Shanbhag NR, Parhi KK (1993) "Relaxed look-ahead pipelined LMS adaptive filters and their application to ADPCM coder," in IEEE Transactions on Circuits and Systems II: Analog and Digital Signal Processing. 40(12):753–766. https://doi.org/10.1109/82.260240 Shanbhag NR, Parhi KK (1993) "Relaxed look-ahead pipelined LMS adaptive filters and their application to ADPCM coder," in IEEE Transactions on Circuits and Systems II: Analog and Digital Signal Processing. 40(12):753–766. https://​doi.​org/​10.​1109/​82.​260240
35.
Zurück zum Zitat Vijayakumar A, Patil VC, Holcomb DE, Paar C, Kundu S (2017) "Physical Design Obfuscation of Hardware: A Comprehensive Investigation of Device and Logic-Level Techniques," in IEEE Transactions on Information Forensics and Security. 12(1): 64–77. https://doi.org/10.1109/TIFS.2016.2601067 Vijayakumar A, Patil VC, Holcomb DE, Paar C, Kundu S (2017) "Physical Design Obfuscation of Hardware: A Comprehensive Investigation of Device and Logic-Level Techniques," in IEEE Transactions on Information Forensics and Security. 12(1): 64–77. https://​doi.​org/​10.​1109/​TIFS.​2016.​2601067
39.
Zurück zum Zitat Zhuang X, Hsien-Hsin TZ, Lee S, Pande S (2004) “Hardware assisted control flow obfuscation for embedded processors,” in Proc. International Conference on Compilers, Architecture, And Synthesis for Embedded Systems. 292–302. https://doi.org/10.1145/1023833.1023873 Zhuang X, Hsien-Hsin TZ, Lee S, Pande S (2004) “Hardware assisted control flow obfuscation for embedded processors,” in Proc. International Conference on Compilers, Architecture, And Synthesis for Embedded Systems. 292–302. https://​doi.​org/​10.​1145/​1023833.​1023873
Metadaten
Titel
Hardware Obfuscation for IP Protection of DSP Applications
verfasst von
Naveenkumar R
N.M. Sivamangai
Napolean A
G. Akashraj Nissi
Publikationsdatum
14.03.2022
Verlag
Springer US
Erschienen in
Journal of Electronic Testing / Ausgabe 1/2022
Print ISSN: 0923-8174
Elektronische ISSN: 1573-0727
DOI
https://doi.org/10.1007/s10836-022-05984-2

Weitere Artikel der Ausgabe 1/2022

Journal of Electronic Testing 1/2022 Zur Ausgabe

Announcement

2021 Reviewers

Neuer Inhalt