Affiliation:
1. Electrical and Computer Engineering Department, University of Florida, Gainesville, United States
2. Computer Science Department, University of Central Florida, Orlando, United States
3. Electrical and Computer Engineering Department, University of Maryland, College Park, United States
Abstract
Due to the inclination towards a fab-less model of integrated circuit (IC) manufacturing, several untrusted entities get white-box access to the proprietary intellectual property (IP) blocks from diverse vendors. To this end, the untrusted entities pose security-breach threats in the form of piracy, cloning, and reverse-engineering, sometimes threatening national security. Hardware obfuscation is a prominent countermeasure against such issues. Obfuscation allows for preventing the usage of the IP blocks without authorization from the IP owners. Due to finite state machine (FSM) transformation-based hardware obfuscation, the design’s FSM gets transformed to make it difficult for an attacker to reverse-engineer the design. A secret key needs to be applied to make the FSM functional, thus preventing the usage of the IP for unintended purposes. Although several hardware obfuscation techniques have been proposed, due to the inability to analyze the techniques from the attackers’ standpoint, numerous vulnerabilities inherent to the obfuscation methods go undetected unless a true adversary discovers them. In this article, we present a collaborative approach between two entities—one acting as an attacker or
red team
and another as a defender or
blue team
, the first systematic approach to replicate the real attacker-defender scenario in the hardware security domain, which in return strengthens the FSM transformation-based obfuscation technique. The
blue team
transforms the underlying FSM of a gate-level netlist using state space obfuscation. The
red team
plays the role of an adversary or evaluator and tries to unlock the design by extracting the unlocking key or recovering the obfuscation circuitries. As the key outcome of this red team–blue team effort, a robust state space obfuscation methodology is evolved showing security promises.
Funder
Defense Advanced Research Projects Agency
Publisher
Association for Computing Machinery (ACM)
Reference24 articles.
1. Yousra Alkabani and Farinaz Koushanfar. 2007. Active hardware metering for intellectual property protection and security. In USENIX Security Symposium. 291–306.
2. Improving on State Register Identification in Sequential Hardware Reverse Engineering
3. HARPOON: An Obfuscation-Based SoC Design Methodology for Hardware Protection
4. Yuri Diogenes and Erdal Ozkaya. 2018. Cybersecurity??? Attack and Defense Strategies: Infrastructure Security with Red Team and Blue Team Tactics. Packt Publishing Ltd.
5. Novel dynamic state-deflection method for gate-level design obfuscation;Dofe Jaya;IEEE Trans. Comput.-aid. Des. Integ. Circ. Syst.,2017