Skip to main content

2017 | OriginalPaper | Buchkapitel

9. Structural Transformation-Based Obfuscation

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Structural transformation-based obfuscation is an approach to avoid the manipulation of the state transition graph of design, thus avoiding the state explosion problem. An obfuscation is called best-possible if the obfuscated design leaks no more information than any other design of the same function. It is first shown that any best-possible obfuscation of a sequential circuit can be accomplished by a sequence of four operations: retiming, resynthesis, sweep, and conditional stuttering. Then a Key-Locked OBfuscation (KLOB) scheme is developed to protect hardware IP against piracy. Starting with an original circuit, KLOB first adds stuttering with conditions both on key checking and on the original circuit and then obfuscates the conditionally stuttered circuit by a sequence of retiming, resynthesis, and sweep. With the correct key, the circuit will run in the original speed; otherwise, it will run much slower. Potential attacks and the countermeasures are thoroughly discussed.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
1
See Sect. 9.5 for detailed discussion.
 
Literatur
1.
Zurück zum Zitat Alkabani Y, Koushanfar F (2007) Active hardware metering for intellectual property protection and security. In: Proceedings of 16th USENIX security symposium on USENIX security symposium, pp 20:1–20:16 Alkabani Y, Koushanfar F (2007) Active hardware metering for intellectual property protection and security. In: Proceedings of 16th USENIX security symposium on USENIX security symposium, pp 20:1–20:16
2.
Zurück zum Zitat Alkabani Y, Koushanfar F, Potkonjak M (2007) Remote activation of ICs for piracy prevention and digital right management. In: Proceedings of the 2007 IEEE/ACM international conference on computer-aided design, pp 674–677 Alkabani Y, Koushanfar F, Potkonjak M (2007) Remote activation of ICs for piracy prevention and digital right management. In: Proceedings of the 2007 IEEE/ACM international conference on computer-aided design, pp 674–677
3.
Zurück zum Zitat Barak B, Goldreich O, Impagliazzo R, Rudich S, Sahai A, Vadhan SP, Yang K (2001) (im)possibility of obfuscating programs. In: Proceedings of the 21st annual international cryptology conference on advances in cryptology, pp 1–18 Barak B, Goldreich O, Impagliazzo R, Rudich S, Sahai A, Vadhan SP, Yang K (2001) (im)possibility of obfuscating programs. In: Proceedings of the 21st annual international cryptology conference on advances in cryptology, pp 1–18
4.
Zurück zum Zitat Baumgarten A, Tyagi A, Zambreno J (2010) Preventing IC piracy using reconfigurable logic barriers. IEEE Design and Test 27:1CrossRef Baumgarten A, Tyagi A, Zambreno J (2010) Preventing IC piracy using reconfigurable logic barriers. IEEE Design and Test 27:1CrossRef
5.
Zurück zum Zitat Brayton R, Mishchenko A (2010) ABC: an academic industrial-strength verification tool. In: Proceedings of the 22nd international conference on computer aided verification, pp 24–40 Brayton R, Mishchenko A (2010) ABC: an academic industrial-strength verification tool. In: Proceedings of the 22nd international conference on computer aided verification, pp 24–40
6.
Zurück zum Zitat Bryant R (1986) Graph-based algorithms for boolean function manipulation. IEEE Trans. Comput. 35:677–691CrossRefMATH Bryant R (1986) Graph-based algorithms for boolean function manipulation. IEEE Trans. Comput. 35:677–691CrossRefMATH
7.
Zurück zum Zitat Chakraborty R, Bhunia S (2008) Hardware protection and authentication through netlist level obfuscation. In: IEEE/ACM international conference on computer-aided design Chakraborty R, Bhunia S (2008) Hardware protection and authentication through netlist level obfuscation. In: IEEE/ACM international conference on computer-aided design
8.
Zurück zum Zitat Dupuis S, Ba P-S, Natale GD, Flottes M-L, Rouzeyre B (2014) A novel hardware logic encryption technique for thwarting illegal overproduction and hardware trojans. In: IEEE international on-line testing symposium Dupuis S, Ba P-S, Natale GD, Flottes M-L, Rouzeyre B (2014) A novel hardware logic encryption technique for thwarting illegal overproduction and hardware trojans. In: IEEE international on-line testing symposium
9.
Zurück zum Zitat Goldwasser S, Rothblum GN (2007) On best-possible obfuscation. In: Proceedings of the 4th conference on theory of cryptography, pp 194–213 Goldwasser S, Rothblum GN (2007) On best-possible obfuscation. In: Proceedings of the 4th conference on theory of cryptography, pp 194–213
10.
Zurück zum Zitat Huang J, Lach J (2008) IC activation and user authentication for security-sensitive systems. In: Proceedings of the 2008 IEEE international workshop on hardware-oriented security and trust, pp 76–80 Huang J, Lach J (2008) IC activation and user authentication for security-sensitive systems. In: Proceedings of the 2008 IEEE international workshop on hardware-oriented security and trust, pp 76–80
11.
Zurück zum Zitat Koushanfar F (2011) Integrated circuits metering for piracy protection and digital rights management: an overview. In: great lakes symposium on VLSI, GLSVLSI ’11, pp 449–454 Koushanfar F (2011) Integrated circuits metering for piracy protection and digital rights management: an overview. In: great lakes symposium on VLSI, GLSVLSI ’11, pp 449–454
12.
Zurück zum Zitat Koushanfar F (2012) Provably secure active IC metering techniques for piracy avoidance and digital rights management. Inf. forensics and secur., IEEE Trans. 7(1):51–63CrossRef Koushanfar F (2012) Provably secure active IC metering techniques for piracy avoidance and digital rights management. Inf. forensics and secur., IEEE Trans. 7(1):51–63CrossRef
13.
Zurück zum Zitat Koushanfar F (2012) Provably secure active IC metering techniques for piracy avoidance and digital rights management. IEEE Trans. on Inform. Forensics and Secur. 7:1CrossRef Koushanfar F (2012) Provably secure active IC metering techniques for piracy avoidance and digital rights management. IEEE Trans. on Inform. Forensics and Secur. 7:1CrossRef
14.
Zurück zum Zitat Koushanfar F, Alkabani Y (2010) Provably secure obfuscation of diverse watermarks for sequential circuits. In: IEEE international symposium on hardware-oriented security and trust (HOST), pp 42–47 Koushanfar F, Alkabani Y (2010) Provably secure obfuscation of diverse watermarks for sequential circuits. In: IEEE international symposium on hardware-oriented security and trust (HOST), pp 42–47
15.
Zurück zum Zitat Koushanfar F, Qu G (2001) Hardware metering. In: Proceedings of the 38th annual design automation conference, pp 490–493 Koushanfar F, Qu G (2001) Hardware metering. In: Proceedings of the 38th annual design automation conference, pp 490–493
16.
Zurück zum Zitat Koushanfar F, Qu G, Potkonjak M (2001) Intellectual property metering. Inform. Hiding. Springer, Heidelberg, pp 81–95CrossRef Koushanfar F, Qu G, Potkonjak M (2001) Intellectual property metering. Inform. Hiding. Springer, Heidelberg, pp 81–95CrossRef
18.
Zurück zum Zitat Lofstrom K, Daasch W, Taylor D (2000) IC identification circuit using device mismatch. In: IEEE international solid-state circuits conference, pp 372–373 Lofstrom K, Daasch W, Taylor D (2000) IC identification circuit using device mismatch. In: IEEE international solid-state circuits conference, pp 372–373
19.
Zurück zum Zitat Lu Y, Zhou H (2013) Retiming for soft error minimization under error-latching window constraints. In: Design automation and test in Europe conference Lu Y, Zhou H (2013) Retiming for soft error minimization under error-latching window constraints. In: Design automation and test in Europe conference
20.
Zurück zum Zitat Lynn B, Prabhakaran M, Sahai A (2004) Positive results and techniques for obfuscation. In: In EUROCRYPT 04 Lynn B, Prabhakaran M, Sahai A (2004) Positive results and techniques for obfuscation. In: In EUROCRYPT 04
21.
Zurück zum Zitat Oliveira AL (1999) Robust techniques for watermarking sequential circuit designs. In: Proceedings of the 36th annual ACM/IEEE design automation conference, pp 837–842 Oliveira AL (1999) Robust techniques for watermarking sequential circuit designs. In: Proceedings of the 36th annual ACM/IEEE design automation conference, pp 837–842
22.
Zurück zum Zitat Oliveira A (2001) Techniques for the creation of digital watermarks in sequential circuit designs. IEEE Trans. on Comput.-Aided Design of Integr. Circuits and Syst. 20(9):1101–1117CrossRef Oliveira A (2001) Techniques for the creation of digital watermarks in sequential circuit designs. IEEE Trans. on Comput.-Aided Design of Integr. Circuits and Syst. 20(9):1101–1117CrossRef
23.
Zurück zum Zitat Rajendran J, Pino Y, Sinanoglu O, Karri R (2012) Security analysis of logic obfuscation. In: Design automation conference Rajendran J, Pino Y, Sinanoglu O, Karri R (2012) Security analysis of logic obfuscation. In: Design automation conference
24.
Zurück zum Zitat Rajendran J, Zhang H, Zhang C, Rose GS, Pino Y, Sinanoglu O, Karri R (2015) Fault analysis-based logic encryption. IEEE Trans. on Comput. 64:2MathSciNetCrossRef Rajendran J, Zhang H, Zhang C, Rose GS, Pino Y, Sinanoglu O, Karri R (2015) Fault analysis-based logic encryption. IEEE Trans. on Comput. 64:2MathSciNetCrossRef
25.
Zurück zum Zitat Roy JA, Koushanfar F, Markov IL (2008) EPIC: ending piracy of integrated circuits. In Design, Automation and Test in EuropeCrossRef Roy JA, Koushanfar F, Markov IL (2008) EPIC: ending piracy of integrated circuits. In Design, Automation and Test in EuropeCrossRef
26.
Zurück zum Zitat Roy JA, Koushanfar F, Markov IL (2008) Protecting bus-based hardware IP by secret sharing. In: Proceedings of the 45th annual design automation conference, pp 846–851 Roy JA, Koushanfar F, Markov IL (2008) Protecting bus-based hardware IP by secret sharing. In: Proceedings of the 45th annual design automation conference, pp 846–851
27.
Zurück zum Zitat Su Y, Holleman J, Otis B (2007) A 1.6pj/bit 96% stable chip-ID generating circuit using process variations. In: IEEE international solid-state circuits conference, pp 406–611 Su Y, Holleman J, Otis B (2007) A 1.6pj/bit 96% stable chip-ID generating circuit using process variations. In: IEEE international solid-state circuits conference, pp 406–611
28.
Zurück zum Zitat Suh GE, Devadas S (2007) Physical unclonable functions for device authentication and secret key generation. In: Proceedings of the 44th annual design automation conference, pp 9–14 Suh GE, Devadas S (2007) Physical unclonable functions for device authentication and secret key generation. In: Proceedings of the 44th annual design automation conference, pp 9–14
29.
Zurück zum Zitat Yuan L, Qu G (2004) Information hiding in finite state machine. In: Proceedings of the 6th international conference on information hiding, pp 340–354 Yuan L, Qu G (2004) Information hiding in finite state machine. In: Proceedings of the 6th international conference on information hiding, pp 340–354
30.
Zurück zum Zitat Zhou H (2009) Retiming and resynthesis with sweep are complete for sequential transformation. In: Proceedings of 9th international conference on formal methods in computer-aided design, pp 192–197 Zhou H (2009) Retiming and resynthesis with sweep are complete for sequential transformation. In: Proceedings of 9th international conference on formal methods in computer-aided design, pp 192–197
Metadaten
Titel
Structural Transformation-Based Obfuscation
verfasst von
Hai Zhou
Copyright-Jahr
2017
DOI
https://doi.org/10.1007/978-3-319-49019-9_9

Neuer Inhalt