ABSTRACT
Untrusted third-parties are found throughout the integrated circuit (IC) design flow resulting in potential threats in IC reliability and security. Threats include IC counterfeiting, intellectual property (IP) theft, IC overproduction, and the insertion of hardware Trojans. Logic encryption has emerged as a method of enhancing security against such threats, however, current implementations of logic encryption, including the XOR or look-up table (LUT) techniques, have high per-gate overheads in area, performance, and power. A novel gate level logic encryption technique with reduced per-gate overheads is described in this paper. In addition, a technique to expand the search space of a key sequence is provided, increasing the difficulty for an adversary to extract the key value. A power reduction of 41.50%, an estimated area reduction of 43.58%, and a performance increase of 34.54% is achieved when using the proposed gate level logic encryption instead of the LUT based technique for an encrypted AND gate.
- DigiTimes, "Trends in the global IC design service market," www.digitimes.com/news/a20120313RS400: html?chid=2, March 2012.Google Scholar
- R. Torrance and D. James, "The State-of-the-Art in Semiconductor Reverse Engineering," Proceedings of the IEEE Design Automation Conference, pp. 333--338, June 2011. Google ScholarDigital Library
- International Chamber of Commerce, "Impacts of counterfeiting and piracy to reach US $1.7 trillion by 2015," http://www.iccwbo.org/News/Articles/2011/Impacts-of-counterfeiting-and-piracy-to-reach-US$1-7-trillion-by-2015/, Feb. 201.Google Scholar
- Semiconductor Equipment and Materials Industry, "Intellectual Property (IP) Challenges and Concerns of the Semiconductor Equipment and Materials Industry," http://www.semi.org/cms/groups/public/documents/web.content/p043701.pdf, April 2008.Google Scholar
- M. Tehranipoor and F. Koushanfar, "A Survey of Hardware Trojan Taxonomy and Detection," IEEE Design and Test of Computers, Vol. 27, No. 1, pp. 10--25, Feb. 2010. Google ScholarDigital Library
- S. Chakraborty and S. Bhunia, "HARPOON: An Obfuscation-Based SoC Design Methodology for Hardware Protection," IEEE Transactions on Computer-aided Design of Integrated Circuits and Systems, Vol. 28, No. 10, pp. 1493--1502, Oct. 2009. Google ScholarDigital Library
- J. Roy, F. Koushanfar, and I. Markov, "EPIC: Ending Piracy of Integrated Circuits," Proceedings of the IEEE/ACM Design, Automation and Test in Europe, pp. 1069--1074, Oct. 2008. Google ScholarDigital Library
- Rajendran, J. and Sinanoglu, O. and Karri, R., "Regaining Trust in VLSI Design: Design-for-Trust Techniques," Proceedings of the IEEE, Vol. 102, No. 8, pp. 1266--1282, July 2014.Google ScholarCross Ref
- Y. Alkabani and K. Farinaz, "Active Hardware Metering for Intellectual Property protection and Security," Proceedings of the USENIX Security Symposium, pp. 291--306, Aug. 2007. Google ScholarDigital Library
- Rajendran, J. and Pino, Y. and Sinanoglu, O. and Karri, R., "Logic Encryption: A Fault Analysis Perspective," Proceedings of the IEEE/ACM Design, Automation and Test in Europe, pp. 953--958, Oct. 2012. Google ScholarDigital Library
- Rajendran, J. and Zhang, H. and Zhang, C. and Rose, G. and Pino, Y. and Sinanoglu, O. and Karri, R., "Fault Analysis-Based Logic Encryption," IEEE Transactions on Computers, Vol. 64, No. 2, pp. 410--424, Feb. 2015.Google ScholarCross Ref
- A. Baumgarten, A. Tyagi, and J. Zambreno, "Preventing IC Piracy Using Reconfigurable Logic Barriers," IEEE Design and Test of Computers, Vol. 27, No. 1, pp. 66--75, Feb. 2010. Google ScholarDigital Library
Index Terms
- Reduced Overhead Gate Level Logic Encryption
Recommendations
Strong Logic Obfuscation with Low Overhead against IC Reverse Engineering Attacks
Untrusted foundries pose threats of integrated circuit (IC) piracy and counterfeiting, and this has motivated research into logic locking. Strong logic locking approaches potentially prevent piracy and counterfeiting by preventing unauthorized ...
Reducing logic encryption overhead through gate level key insertion
2016 IEEE International Symposium on Circuits and Systems (ISCAS)Integrated circuits (ICs) are used in fields such as banking, transportation, energy, health, and the military. However, the use of ICs in many applications is threatened by an increasing reliance on untrusted third-parties within the IC design flow. The ...
Resilient and Secure Hardware Devices Using ASL
Hardware and Algorithms for Efficient Machine LearningDue to the globalization of Integrated Circuit (IC) design in the semiconductor industry and the outsourcing of chip manufacturing, Third-Party Intellectual Properties (3PIPs) become vulnerable to IP piracy, reverse engineering, counterfeit IC, and ...
Comments