Using Pattern of On-Off Routers and Links and Router Delays to Protect Network-on-Chip Intellectual Property

被引:2
作者
Biswas, Arnab Kumar [1 ]
机构
[1] Queens Univ Belfast, Ctr Secure Informat Technol, Sch Elect Elect Engn & Comp Sci, Belfast BT3 9DT, Antrim, North Ireland
来源
ACM TRANSACTIONS ON COMPUTER SYSTEMS | 2022年 / 40卷 / 1-4期
基金
英国工程与自然科学研究理事会;
关键词
Intellectual Property protection; NoC IP protection; fingerprinting technique; WATERMARKING TECHNIQUES; SOC;
D O I
10.1145/3548680
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Intellectual Property (IP) reuse is a well known practice in chip design processes. Nowadays, network-on-chips (NoCs) are increasingly used as IP and sold by various vendors to be integrated in a multiprocessor system-on-chip (MPSoC). However, IP reuse exposes the design to IP theft, and an attacker can launch IP stealing attacks against NoC IPs. With the growing adoption of MPSoC, such attacks can result in huge financial losses. In this article, we propose four NoC IP protection techniques using fingerprint embedding: ON-OFF router-based fingerprinting (ORF), ON-OFF link-based fingerprinting (OLF), Router delay-based fingerprinting (RTDF), and Row delay-based fingerprinting (RWDF). ORF and OLF techniques use patterns of ON-OFF routers and links, respectively, while RTDF and RWDF techniques use router delays to embed fingerprints. We show that all of our proposed techniques require much less hardware overhead compared to an existing NoC IP security solution (square spiral routing) and also provide better security from removal and masking attacks. In particular, our proposed techniques require between 40.75% and 48.43% less router area compared to the existing solution. We also show that our solutions do not affect the normal packet latency and hence do not degrade the NoC performance.
引用
收藏
页数:19
相关论文
共 15 条
[1]  
[Anonymous], 2001, Federal Information Processing Standards Publication
[2]  
Becker Georg T., 2017, HARDWARE OBFUSCATION, P105
[3]   A Blind Dynamic Fingerprinting Technique for Sequential Circuit Intellectual Property Protection [J].
Chang, Chip-Hong ;
Zhang, Li .
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2014, 33 (01) :76-89
[4]   Testing-based watermarking techniques for intellectual-property identification in SOC design [J].
Fan, Yu-Cheng .
IEEE TRANSACTIONS ON INSTRUMENTATION AND MEASUREMENT, 2008, 57 (03) :467-479
[5]   Constraint-based watermarking techniques for design IP protection [J].
Kahng, AB ;
Lach, J ;
Mangione-Smith, WH ;
Mantik, S ;
Markov, IL ;
Potkonjak, M ;
Tucker, P ;
Wang, HJ ;
Wolfe, G .
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2001, 20 (10) :1236-1252
[6]  
Kahng AB, 1998, 1998 DESIGN AUTOMATION CONFERENCE, PROCEEDINGS, P782, DOI 10.1109/DAC.1998.724577
[7]   Study on PUF based secure protection for IC design [J].
Liang, Wei ;
Liao, Bo ;
Long, Jing ;
Jiang, Yan ;
Peng, Li .
MICROPROCESSORS AND MICROSYSTEMS, 2016, 45 :56-66
[8]   VLSI supply chain security risks and mitigation techniques: A survey [J].
Liu, Bao ;
Qu, Gang .
INTEGRATION-THE VLSI JOURNAL, 2016, 55 :438-448
[9]   IP Protection of Mesh NoCs Using Square Spiral Routing [J].
Liu, Qiang ;
Ji, Wenqing ;
Chen, Qi ;
Mak, Terrence .
IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 2016, 24 (04) :1560-1573
[10]  
Qu G, 2012, INTRODUCTION TO HARDWARE SECURITY AND TRUST, P123, DOI 10.1007/978-1-4419-8080-9_6