High-Level Synthesis of Key Based Obfuscated RTL Datapaths

被引:0
作者
Islam, Sheikh Ariful [1 ]
Katkoori, Srinivas [1 ]
机构
[1] Univ S Florida, Dept Comp Sci & Engn, Tampa, FL 33620 USA
来源
2018 19TH INTERNATIONAL SYMPOSIUM ON QUALITY ELECTRONIC DESIGN (ISQED) | 2018年
关键词
PROTECTION; DESIGN;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Reverse engineering (RE) a register transfer level (RTL) description allows an attacker to counterfeit intellectual property (IP) as well as introduce hardware trojans. To mitigate this risk, RTL obfuscation can be employed. Most of the existing obfuscation methods are targeted at gate-level and layout-level. In this work, we propose key based RTL obfuscation scheme at an early design phase during high-level synthesis (HLS). Given a control data flow graph (CDFG), obfuscation points are identified during scheduling and obfuscation logic is inserted during the datapath generation phase. In order to keep performance overhead low, such insertion is done only on noncritical paths. We implemented the proposed obfuscation technique in an in-house HLS system and the obfuscated RTL designs were synthesized to gate-level with Synopsys Design compiler targeting 90nm CMOS technology library. Based on the experimental results on four datapath intensive benchmarks, we demonstrate that proposed approach obfuscates the design with extremely low probability of reverse engineering. For a 32-bit obfuscation key, the average area, delay, and power overheads are 2.45%, 2.65%, and 2.61% respectively, which are reasonable.
引用
收藏
页码:407 / 412
页数:6
相关论文
共 24 条
  • [1] Alkabani YM, 2007, USENIX ASSOCIATION PROCEEDINGS OF THE 16TH USENIX SECURITY SYMPOSIUM, P291
  • [2] [Anonymous], P 31 IEEE VLSI TEST
  • [3] [Anonymous], 1994, SYNTHESIS OPTIMIZATI, DOI DOI 10.5555/541643
  • [4] [Anonymous], P 51 ACM EDAC IEEE D
  • [5] Effective iteractive techniques for fingerprinting design IP
    Caldwell, AE
    Choi, HJ
    Kahng, AB
    Mantik, S
    Potkonjak, M
    Qu, G
    Wong, JL
    [J]. IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2004, 23 (02) : 208 - 215
  • [6] Chakraborty Rajat Subhra, 2008, 2008 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), P674, DOI 10.1109/ICCAD.2008.4681649
  • [7] RTL Hardware IP Protection Using Key-Based Control and Data Flow Obfuscation
    Chakraborty, Rajat Subhra
    Bhunia, Swarup
    [J]. 23RD INTERNATIONAL CONFERENCE ON VLSI DESIGN, 2010, : 405 - 410
  • [8] Security Through Obscurity: An Approach for Protecting Register Transfer Level Hardware IP
    Chakraborty, Rajat Subhra
    Bhunia, Swarup
    [J]. 2009 IEEE INTERNATIONAL WORKSHOP ON HARDWARE-ORIENTED SECURITY AND TRUST, 2009, : 96 - 99
  • [9] HARPOON: An Obfuscation-Based SoC Design Methodology for Hardware Protection
    Chakraborty, Rajat Subhra
    Bhunia, Swarup
    [J]. IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2009, 28 (10) : 1493 - 1502
  • [10] Chow Lap Wai, 2012, US Patent, Patent No. [8,151,235, 8151235]