FPGA IP Obfuscation Using Ring Oscillator Physical Unclonable Function

被引:0
作者
Hazari, Noor Ahmad [1 ]
Alsulami, Faris [1 ]
Niamat, Mohammed [1 ]
机构
[1] Univ Toledo, Dept Elect Engn & Comp Sci, 2801 W Bancroft St, Toledo, OH 43606 USA
来源
NAECON 2018 - IEEE NATIONAL AEROSPACE AND ELECTRONICS CONFERENCE | 2018年
关键词
FPGA; Hardware Obfuscation; Ring Oscillator; Logic Obfuscation; PUF; IP obfuscation;
D O I
暂无
中图分类号
V [航空、航天];
学科分类号
08 ; 0825 ;
摘要
IP piracy, reverse engineering, and tampering with FPGA based IP is increasing over time. ROPUF based IP obfuscation can provide a feasible solution. In this paper, a novel approach of FPGA IP obfuscation is implemented using Ring Oscillator based Physical Unclonable Function (ROPUF) and random logic gates. This approach provides a lock and key mechanism as well as authentication of FPGA based designs to protect from security threats. Using the Xilinx ISE design tools and ISCAS 89 benchmarks we have designed a secure FPGA based IP protection scheme with an average of 15% area and 10% of power overhead.
引用
收藏
页码:105 / 108
页数:4
相关论文
共 10 条
  • [1] Hardware Trojan Insertion by Direct Modification of FPGA Configuration Bitstream
    Chakraborty, Rajat Subhra
    Saha, Indrasish
    Palchaudhuri, Ayan
    Naik, Gowtham Kumar
    [J]. IEEE DESIGN & TEST, 2013, 30 (02) : 45 - 54
  • [2] Partial bitstream protection for low-cost FPGAs with physical unclonable function, obfuscation, and dynamic partial self reconfiguration
    Goren, Sezer
    Ozkurt, Ozgur
    Yildiz, Abdullah
    Ugurdag, H. Fatih
    Chakraborty, Rajat S.
    Mukhopadhyay, Debdeep
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2013, 39 (02) : 386 - 397
  • [3] Hazari NA, 2017, PROC NAECON IEEE NAT, P362, DOI 10.1109/NAECON.2017.8268803
  • [4] Karam R., 2016, P INT C RECONFIGURAB, P1
  • [5] FPGA-Based Protection Scheme against Hardware Trojan Horse Insertion Using Dummy Logic
    Khaleghi, Behnam
    Ahari, Ali
    Asadi, Hossein
    Bayat-Sarmadi, Siavash
    [J]. IEEE EMBEDDED SYSTEMS LETTERS, 2015, 7 (02) : 46 - 50
  • [6] Majzoobi M, 2012, INTRODUCTION TO HARDWARE SECURITY AND TRUST, P195, DOI 10.1007/978-1-4419-8080-9_9
  • [7] Moradi A, 2011, PROCEEDINGS OF THE 18TH ACM CONFERENCE ON COMPUTER & COMMUNICATIONS SECURITY (CCS 11), P111
  • [8] Pundir N, 2017, PROC NAECON IEEE NAT, P84, DOI 10.1109/NAECON.2017.8268749
  • [9] A Survey of Hardware Trojan Taxonomy and Detection
    Tehranipoor, Mohammad
    Koushanfar, Farinaz
    [J]. IEEE DESIGN & TEST OF COMPUTERS, 2010, 27 (01): : 10 - 25
  • [10] Three Ages of FPGAs: A Retrospective on the First Thirty Years of FPGA Technology
    Trimberger, Stephen M.
    [J]. PROCEEDINGS OF THE IEEE, 2015, 103 (03) : 318 - 331