Skip to main content

2017 | OriginalPaper | Buchkapitel

5. Permutation-Based Obfuscation

verfasst von : Zimu Guo, Mark M. Tehranipoor, Domenic Forte

Erschienen in: Hardware Protection through Obfuscation

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Hardware obfuscation techniques have been studied in preventing reverse engineering and piracy issues. One branch of these techniques is permutation-based obfuscation. In this chapter, permutation-based obfuscation is presented at both the chip level and board level. Prior to providing the implementation details, several implementation-related topics are discussed. These topics consist of the difference between the chip-level and board-level designs as well as the introduction of a general obfuscation implementation flow. Besides the flow, this chapter also provides methodologies for evaluating the obfuscation performance. Finally, potential attacks on permutation-based obfuscation are discussed along with their corresponding countermeasures.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Roy JA, Koushanfar F, Markov IL (2008) Epic: Ending piracy of integrated circuits. In: Proceedings of the conference on Design, automation and test in Europe. ACM, pp 1069–1074 Roy JA, Koushanfar F, Markov IL (2008) Epic: Ending piracy of integrated circuits. In: Proceedings of the conference on Design, automation and test in Europe. ACM, pp 1069–1074
2.
Zurück zum Zitat Guo Z, Tehranipoor M, Forte D, Di J (2015) Investigation of obfuscation-based anti-reverse engineering for printed circuit boards. In: Proceedings of the 52nd annual design automation conference. ACM, p 114 Guo Z, Tehranipoor M, Forte D, Di J (2015) Investigation of obfuscation-based anti-reverse engineering for printed circuit boards. In: Proceedings of the 52nd annual design automation conference. ACM, p 114
3.
Zurück zum Zitat Chakraborty R, Bhunia S (2009) Harpoon: An obfuscation-based soc design methodology for hardware protection. IEEE Trans Comput-Aided Design Integr Circuits Syst 28:1493CrossRef Chakraborty R, Bhunia S (2009) Harpoon: An obfuscation-based soc design methodology for hardware protection. IEEE Trans Comput-Aided Design Integr Circuits Syst 28:1493CrossRef
4.
Zurück zum Zitat Chakraborty R, Bhunia S (2010) Rtl hardware ip protection using key-based control and data flow obfuscation. In: 23rd international conference on VLSI design, VLSID’10. IEEE, pp 405–410 Chakraborty R, Bhunia S (2010) Rtl hardware ip protection using key-based control and data flow obfuscation. In: 23rd international conference on VLSI design, VLSID’10. IEEE, pp 405–410
5.
Zurück zum Zitat Koushanfar F (2012) Provably secure active ic metering techniques for piracy avoidance and digital rights management. IEEE Trans Inf Forensics Secur 7(1):51–63CrossRef Koushanfar F (2012) Provably secure active ic metering techniques for piracy avoidance and digital rights management. IEEE Trans Inf Forensics Secur 7(1):51–63CrossRef
6.
Zurück zum Zitat Baumgarten AC (2009) Preventing integrated circuit piracy using reconfigurable logic barriers Baumgarten AC (2009) Preventing integrated circuit piracy using reconfigurable logic barriers
7.
Zurück zum Zitat Zamanzadeh S, Jahanian A (2016) Higher security of asic fabrication process against reverse engineering attack using automatic netlist encryption methodology. Microprocess Microsyst 42:1–9CrossRef Zamanzadeh S, Jahanian A (2016) Higher security of asic fabrication process against reverse engineering attack using automatic netlist encryption methodology. Microprocess Microsyst 42:1–9CrossRef
8.
Zurück zum Zitat Tehranipoor M, Wang C (2011) Introduction to hardware security and trust. Springer Science & Business Media, New York Tehranipoor M, Wang C (2011) Introduction to hardware security and trust. Springer Science & Business Media, New York
9.
Zurück zum Zitat Handschuh H, Paillier P, Stern J (1999) Probing attacks on tamper-resistant devices. Cryptographic hardware and embedded systems. Springer, Berlin, pp 303–315MATH Handschuh H, Paillier P, Stern J (1999) Probing attacks on tamper-resistant devices. Cryptographic hardware and embedded systems. Springer, Berlin, pp 303–315MATH
10.
Zurück zum Zitat Quadir SE, Chen J, Forte D, Asadizanjani N, Shahbazmohamadi S, Wang L, Chandy J, Tehranipoor M (2016) A survey on chip to system reverse engineering. ACM J Emerg Technol Comput Syst (JETC) 13(1):6 Quadir SE, Chen J, Forte D, Asadizanjani N, Shahbazmohamadi S, Wang L, Chandy J, Tehranipoor M (2016) A survey on chip to system reverse engineering. ACM J Emerg Technol Comput Syst (JETC) 13(1):6
11.
Zurück zum Zitat Asadizanjani N (2015) Non-destructive pcb reverse engineering using x-ray micro computed tomography. In: ISTFA Asadizanjani N (2015) Non-destructive pcb reverse engineering using x-ray micro computed tomography. In: ISTFA
12.
Zurück zum Zitat Zhang F, Hennessy A, Bhunia S (2015) Robust counterfeit pcb detection exploiting intrinsic trace impedance variations. In: IEEE 33rd VLSI test symposium (VTS). IEEE, pp 1–6 Zhang F, Hennessy A, Bhunia S (2015) Robust counterfeit pcb detection exploiting intrinsic trace impedance variations. In: IEEE 33rd VLSI test symposium (VTS). IEEE, pp 1–6
13.
Zurück zum Zitat Roy JA, Koushanfar F, Markov IL (2008) Protecting bus-based hardware ip by secret sharing. In: Proceedings of the 45th annual design automation conference. ACM, pp 846–851 Roy JA, Koushanfar F, Markov IL (2008) Protecting bus-based hardware ip by secret sharing. In: Proceedings of the 45th annual design automation conference. ACM, pp 846–851
14.
Zurück zum Zitat Waksman A (1968) A permutation network. In: JACM Waksman A (1968) A permutation network. In: JACM
15.
Zurück zum Zitat Thamarakuzhi A, Chandy JA (2010) 2-dilated flattened butterfly: A nonblocking switching network. In: HPSR Thamarakuzhi A, Chandy JA (2010) 2-dilated flattened butterfly: A nonblocking switching network. In: HPSR
16.
Zurück zum Zitat Mitra D, Cieslak RA (1987) Randomized parallel communications on an extension of the omega network. In: JACM Mitra D, Cieslak RA (1987) Randomized parallel communications on an extension of the omega network. In: JACM
17.
Zurück zum Zitat Giacomazzi P, Trecordi V (1995) A study of non blocking multicast switching networks. IEEE Trans Commun 43:1163CrossRef Giacomazzi P, Trecordi V (1995) A study of non blocking multicast switching networks. IEEE Trans Commun 43:1163CrossRef
18.
Zurück zum Zitat Jajszczyk A (2003) Nonblocking, repackable, and rearrangeable clos networks: fifty years of the theory evolution. IEEE Commun Mag 41(10):28–33CrossRef Jajszczyk A (2003) Nonblocking, repackable, and rearrangeable clos networks: fifty years of the theory evolution. IEEE Commun Mag 41(10):28–33CrossRef
19.
Zurück zum Zitat Yang J, Yang J, Li X, Chang S, Su S, Ping X (2011) Optical implementation of polarization-independent, bidirectional, nonblocking clos network using polarization control technique in free space. In: Optic Eng 50(4):045 003–045 003 Yang J, Yang J, Li X, Chang S, Su S, Ping X (2011) Optical implementation of polarization-independent, bidirectional, nonblocking clos network using polarization control technique in free space. In: Optic Eng 50(4):045 003–045 003
22.
Zurück zum Zitat Chang C, Melhem R (1997) Arbitrary size benes networks. Parallel Process Lett 7(3):279–284CrossRef Chang C, Melhem R (1997) Arbitrary size benes networks. Parallel Process Lett 7(3):279–284CrossRef
23.
Zurück zum Zitat Nassimi D, Sahni S (1982) Parallel algorithms to set up the benes permutation network. IEEE Trans Comput vC-31(2):148–154 Nassimi D, Sahni S (1982) Parallel algorithms to set up the benes permutation network. IEEE Trans Comput vC-31(2):148–154
24.
Zurück zum Zitat Jeong H, Choi Y, Jeon W, Yang F, Lee Y, Kim S, Won D (2007) Vulnerability analysis of secure usb flash drives. In: IEEE international workshop on memory technology, design and testing, MTDT. IEEE, pp 61–64 Jeong H, Choi Y, Jeon W, Yang F, Lee Y, Kim S, Won D (2007) Vulnerability analysis of secure usb flash drives. In: IEEE international workshop on memory technology, design and testing, MTDT. IEEE, pp 61–64
25.
Zurück zum Zitat Guo Z, Karimian N, Tehranipoor MM, Forte D (2016) Hardware security meets biometrics for the age of iot. In: IEEE International Symposium on Circuits and Systems (ISCAS) Guo Z, Karimian N, Tehranipoor MM, Forte D (2016) Hardware security meets biometrics for the age of iot. In: IEEE International Symposium on Circuits and Systems (ISCAS)
26.
Zurück zum Zitat Wayman J, Jain A, Maltoni D, Maio D (2005) An introduction to biometric authentication systems. Springer, LondonCrossRef Wayman J, Jain A, Maltoni D, Maio D (2005) An introduction to biometric authentication systems. Springer, LondonCrossRef
27.
Zurück zum Zitat Ahi K, Asadizanjani N, Shahbazmohamadi S, Tehranipoor M, Anwar M (2015) Terahertz characterization of electronic components and comparison of terahertz imaging with x-ray imaging techniques. In: SPIE sensing technology + applications Ahi K, Asadizanjani N, Shahbazmohamadi S, Tehranipoor M, Anwar M (2015) Terahertz characterization of electronic components and comparison of terahertz imaging with x-ray imaging techniques. In: SPIE sensing technology + applications
28.
Zurück zum Zitat Abraham DG, Dolan GM, Double GP, Stevens JV (1991) Transaction security system. In: IBM Syst J Abraham DG, Dolan GM, Double GP, Stevens JV (1991) Transaction security system. In: IBM Syst J
29.
Zurück zum Zitat Karri R, Rajendran J, Rosenfeld K, Tehranipoor M (2010) Trustworthy hardware: Identifying and classifying hardware trojans. IEEE Trans Comput 43(10):39–46 Karri R, Rajendran J, Rosenfeld K, Tehranipoor M (2010) Trustworthy hardware: Identifying and classifying hardware trojans. IEEE Trans Comput 43(10):39–46
Metadaten
Titel
Permutation-Based Obfuscation
verfasst von
Zimu Guo
Mark M. Tehranipoor
Domenic Forte
Copyright-Jahr
2017
DOI
https://doi.org/10.1007/978-3-319-49019-9_5

Neuer Inhalt