Security Evaluation of State Space Obfuscation of Hardware IP through a Red Team-Blue Team Practice

Author:

Rahman Md Moshiur1ORCID,Geist Jim2ORCID,Xing Daniel3ORCID,Liu Yuntao3ORCID,Srivastava Ankur3ORCID,Meade Travis2ORCID,Jin Yier1ORCID,Bhunia Swarup1ORCID

Affiliation:

1. Electrical and Computer Engineering Department, University of Florida, Gainesville, United States

2. Computer Science Department, University of Central Florida, Orlando, United States

3. Electrical and Computer Engineering Department, University of Maryland, College Park, United States

Abstract

Due to the inclination towards a fab-less model of integrated circuit (IC) manufacturing, several untrusted entities get white-box access to the proprietary intellectual property (IP) blocks from diverse vendors. To this end, the untrusted entities pose security-breach threats in the form of piracy, cloning, and reverse-engineering, sometimes threatening national security. Hardware obfuscation is a prominent countermeasure against such issues. Obfuscation allows for preventing the usage of the IP blocks without authorization from the IP owners. Due to finite state machine (FSM) transformation-based hardware obfuscation, the design’s FSM gets transformed to make it difficult for an attacker to reverse-engineer the design. A secret key needs to be applied to make the FSM functional, thus preventing the usage of the IP for unintended purposes. Although several hardware obfuscation techniques have been proposed, due to the inability to analyze the techniques from the attackers’ standpoint, numerous vulnerabilities inherent to the obfuscation methods go undetected unless a true adversary discovers them. In this article, we present a collaborative approach between two entities—one acting as an attacker or red team and another as a defender or blue team , the first systematic approach to replicate the real attacker-defender scenario in the hardware security domain, which in return strengthens the FSM transformation-based obfuscation technique. The blue team transforms the underlying FSM of a gate-level netlist using state space obfuscation. The red team plays the role of an adversary or evaluator and tries to unlock the design by extracting the unlocking key or recovering the obfuscation circuitries. As the key outcome of this red team–blue team effort, a robust state space obfuscation methodology is evolved showing security promises.

Funder

Defense Advanced Research Projects Agency

Publisher

Association for Computing Machinery (ACM)

Reference24 articles.

1. Yousra Alkabani and Farinaz Koushanfar. 2007. Active hardware metering for intellectual property protection and security. In USENIX Security Symposium. 291–306.

2. Improving on State Register Identification in Sequential Hardware Reverse Engineering

3. HARPOON: An Obfuscation-Based SoC Design Methodology for Hardware Protection

4. Yuri Diogenes and Erdal Ozkaya. 2018. Cybersecurity??? Attack and Defense Strategies: Infrastructure Security with Red Team and Blue Team Tactics. Packt Publishing Ltd.

5. Novel dynamic state-deflection method for gate-level design obfuscation;Dofe Jaya;IEEE Trans. Comput.-aid. Des. Integ. Circ. Syst.,2017

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3