Security-Aware Resource Binding to Enhance Logic Obfuscation

被引:0
作者
Zuzak, Michael [1 ]
Liu, Yuntao [2 ]
Srivastava, Ankur [2 ]
机构
[1] Rochester Inst Technol, Dept Comp Engn, Rochester, NY 14623 USA
[2] Univ Maryland, Dept Elect & Comp Engn, College Pk, MD 20742 USA
基金
美国国家科学基金会;
关键词
Security; Resilience; Integrated circuits; IP networks; Fabrication; Logic gates; Cost function; Resource management; Benchmark testing; High-level synthesis (HLS); logic locking; logic obfuscation; resource binding; untrusted foundry; LOCKING; ATTACKS;
D O I
10.1109/TCAD.2023.3294453
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Logic obfuscation mitigates the unauthorized use of design IP by untrusted partners during integrated circuit (IC) fabrication. To do so, these techniques produce gate-level errors that derail typical applications run on the IC. Recent research has derived a link between the error rate and the Boolean satisfiability (SAT) attack resilience of logic obfuscation. As a result, it has been shown to be difficult for obfuscation to inject sufficient gate-level error to derail application-level function while maintaining resilience to SAT-style attacks. In this work, we explore use of architectural knowledge during the resource binding phase of high-level synthesis to automate the design of locked architectures capable of high-corruption and SAT resilience simultaneously. To do so, we bifurcate logic obfuscation schemes into two families based on their error profile: distributed error locking and critical minterm locking. We then develop security-focused binding/locking algorithms for each locking family and use them to bind/lock 11 MediaBench benchmarks. For distributed error locking, our proposed security-aware binding algorithms designed locked circuits capable of corrupting a typical application for 52% more wrong keys than a circuit bound with conventional algorithms. For critical minterm locking, our proposed security-aware binding algorithms designed locked circuits capable of corrupting a typical application for 100% of wrong keys while also exhibiting $26\times $ more application errors than a circuit bound with conventional algorithms. Regardless of locking family, our security-aware algorithms improved corruption without degrading SAT resilience or incurring sizable design overheads to do so. Obfuscation applied post-binding could not achieve high-corruption and SAT resilience simultaneously in these benchmarks.
引用
收藏
页码:4528 / 4540
页数:13
相关论文
共 46 条
  • [1] Azar KZ, 2019, IACR T CRYPTOGRAPHIC, P97
  • [2] Keynote: A Disquisition on Logic Locking
    Chakraborty, Abhishek
    Jayasankaran, Nithyashankari Gummidipoondi
    Liu, Yuntao
    Rajendran, Jeyavijayan
    Sinanoglu, Ozgur
    Srivastava, Ankur
    Xie, Yang
    Yasin, Muhammad
    Zuzak, Michael
    [J]. IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2020, 39 (10) : 1952 - 1972
  • [3] CHANG JM, 1995, DES AUT CON, P29, DOI 10.1109/DAC.1995.250019
  • [4] DECOY: DEflection-Driven HLS-Based Computation Partitioning for Obfuscating Intellectual PropertY
    Chen, Jianqi
    Zaman, Monir
    Makris, Yiorgos
    Blanton, R. D.
    Mitra, Subhasish
    Schafer, Benjamin Carrion
    [J]. PROCEEDINGS OF THE 2020 57TH ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2020,
  • [5] Chu-Yi Huang, 1990, 27th ACM/IEEE Design Automation Conference. Proceedings 1990 (Cat. No.90CH2894-4), P499, DOI 10.1109/DAC.1990.114907
  • [6] El Massad M, 2017, Arxiv, DOI arXiv:1703.10187
  • [7] High-Level Synthesis of Key-Obfuscated RTL IP with Design Lockout and Camouflaging
    Islam, Sheikh Ariful
    Sah, Love Kumar
    Katkoori, Srinivas
    [J]. ACM TRANSACTIONS ON DESIGN AUTOMATION OF ELECTRONIC SYSTEMS, 2021, 26 (01)
  • [8] Kamali H. M., 2022, Rep. 2022/260
  • [9] InterLock: An Intercorrelated Logic and Routing Locking
    Kamali, Hadi Mardani
    Azar, Kimia Zamiri
    Homayoun, Houman
    Sasan, Avesta
    [J]. 2020 IEEE/ACM INTERNATIONAL CONFERENCE ON COMPUTER AIDED-DESIGN (ICCAD), 2020,
  • [10] Full-Lock: Hard Distributions of SAT instances for Obfuscating Circuits using Fully Configurable Logic and Routing Blocks
    Kamali, Hadi Mardani
    Azar, Kimia Zamiri
    Homayoun, Houman
    Sasan, Avesta
    [J]. PROCEEDINGS OF THE 2019 56TH ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2019,