HLock: Locking IPs at the High-Level Language

被引:19
作者
Muttaki, Md Rafid [1 ]
Mohammadivojdan, Roshanak [1 ]
Tehranipoor, Mark [1 ]
Farahmandi, Farimah [1 ]
机构
[1] Univ Florida, ECE Dept, Gainesville, FL 32611 USA
来源
2021 58TH ACM/IEEE DESIGN AUTOMATION CONFERENCE (DAC) | 2021年
关键词
High-Level Synthesis; Logic Locking; Obfuscation; IP Protection;
D O I
10.1109/DAC18074.2021.9586159
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The introduction of the horizontal business model for the semiconductor industry has introduced trust issues for the integrated circuit supply chain. The most common vulnerabilities related to intellectual properties can be caused by untrusted third-party vendors and malicious foundries. Various techniques have been proposed to lock the design at the gate-level or RTL before sending it to the untrusted foundry for fabrication. However, such techniques have been proven to be easily broken using SAT attacks and machine learning-based attacks. In this paper, we propose HLock, a framework for ensuring hardware protection in the form of locking at the high-level description of the design. Our approach includes a formal analysis of design specifications, assets, and critical operations to determine points in which locking keys are inserted. The locked design is then synthesized using high-level synthesis, which has become an integral part of modern IP design due to its advantages on lesser development and verification efforts. The locking at the higher abstraction with the combination of multiple syntheses shows that HLock delivers superior performance considering attack resiliency (i.e., SAT attack, removal attacks, machine learning-based attacks) and overheads compared to conventional locking techniques. Additionally, HLock provides a dynamic/automatic locking solution for any high-level abstraction design based on performance constraints, attack resiliency, power, and area overheads as well as locking key size, and it is well suited for large-scale designs.
引用
收藏
页码:79 / 84
页数:6
相关论文
共 30 条
[1]  
Alaql A, 2019, PROCEEDINGS OF THE 2019 ASIAN HARDWARE ORIENTED SECURITY AND TRUST SYMPOSIUM (ASIANHOST)
[2]  
Alkabani YM, 2007, USENIX ASSOCIATION PROCEEDINGS OF THE 16TH USENIX SECURITY SYMPOSIUM, P291
[3]  
[Anonymous], 2007, SBIR AWARD
[4]  
Badier H, 2019, DES AUT TEST EUROPE, P1118, DOI [10.23919/DATE.2019.8715083, 10.23919/date.2019.8715083]
[5]  
Chakraborty P, 2018, PROCEEDINGS OF THE 2018 ASIAN HARDWARE ORIENTED SECURITY AND TRUST SYMPOSIUM (ASIANHOST), P56, DOI 10.1109/AsianHOST.2018.8607163
[6]   RTL Hardware IP Protection Using Key-Based Control and Data Flow Obfuscation [J].
Chakraborty, Rajat Subhra ;
Bhunia, Swarup .
23RD INTERNATIONAL CONFERENCE ON VLSI DESIGN, 2010, :405-410
[7]   An Introduction to High-Level Synthesis [J].
Coussy, Philippe ;
Meredith, Michael ;
Gajski, Daniel D. ;
Takach, Andres .
IEEE DESIGN & TEST OF COMPUTERS, 2009, 26 (04) :8-17
[8]  
Dupuis S, 2014, IEEE INT ON LINE, P49, DOI 10.1109/IOLTS.2014.6873671
[9]  
Guin U, 2017, IEEE VLSI TEST SYMP
[10]   Counterfeit Integrated Circuits: A Rising Threat in the Global Semiconductor Supply Chain [J].
Guin, Ujjwal ;
Huang, Ke ;
DiMase, Daniel ;
Carulli, John M., Jr. ;
Tehranipoor, Mohammad ;
Makris, Yiorgos .
PROCEEDINGS OF THE IEEE, 2014, 102 (08) :1207-1228