HARPOON: An Obfuscation-Based SoC Design Methodology for Hardware Protection

被引:332
作者
Chakraborty, Rajat Subhra [1 ]
Bhunia, Swarup [1 ]
机构
[1] Case Western Reserve Univ, Dept Elect Engn & Comp Sci, Cleveland, OH 44106 USA
关键词
Design for security; hardware authentication; hardware obfuscation; intellectual-property (IP) piracy; IP protection;
D O I
10.1109/TCAD.2009.2028166
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Hardware intellectual-property (IP) cores have emerged as an integral part of modern system-on-chip (SoC) designs. However, IP vendors are facing major challenges to protect hardware IPs from IP piracy. This paper proposes a novel design methodology for hardware IP protection using netlist-level obfuscation. The proposed methodology can be integrated in the SoC design and manufacturing flow to simultaneously obfuscate and authenticate the design. Simulation results for a set of ISCAS-89 benchmark circuits and the advanced-encryption-standard IP core show that high levels of security can be achieved at less than 5% area and power overhead under delay constraint.
引用
收藏
页码:1493 / 1502
页数:10
相关论文
共 20 条
[1]  
Alkabani Y, 2007, IEEE IC CAD, P674
[2]  
[Anonymous], [No title captured]
[3]  
[Anonymous], 2011, THICKET FAMILY SOURC
[4]  
[Anonymous], ISCAS 89 BENCHMARK C
[5]  
[Anonymous], RECOMMENDED PRACTICE
[6]  
[Anonymous], ARM: the Architecture for the Digital World
[7]  
BATRA T, METHODOLOGY PROTECTI
[8]   IPP@HDL: Efficient intellectual property protection scheme for IP cores [J].
Castillo, Encarnacion ;
Meyer-Baese, Uwe ;
Garcia, Antonio ;
Parrilla, Luis ;
Lloris, Antonio .
IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 2007, 15 (05) :578-591
[9]  
Chakraborty R. S., 2008, P IEEE ACM INT C COM, P674
[10]  
Goering R., Synplicity initiative eases IP evaluation for FPGAs"