An Overview of FPGA-inspired Obfuscation Techniques

Author:

Abideen Zain Ul12ORCID,Gokulanathan Sumathi3ORCID,J. Aljafar Muayad3ORCID,Pagliarini Samuel12ORCID

Affiliation:

1. Electrical and Computer Engineering, Carnegie Mellon University, Pittsburgh, United States

2. Centre for Hardware Security, Department of Computer Systems, Tallinn University of Technology (TalTech), Tallinn, Estonia

3. Tallinn University of Technology, Tallinn, Estonia

Abstract

Building and maintaining a silicon foundry is a costly endeavor that requires substantial financial investment. From this scenario, the semiconductor business has largely shifted to a fabless model where the Integrated Circuit (IC) supply chain is globalized but potentially untrusted. In recent years, several hardware obfuscation techniques have emerged to thwart hardware security threats related to untrusted IC fabrication. Reconfigurable-based obfuscation schemes have shown great promise of security against state-of-the-art attacks – these are techniques that rely on the transformation of static logic configurable elements such as Look Up Tables (LUTs). This survey provides a comprehensive analysis of reconfigurable-based obfuscation techniques, evaluating their overheads and enumerating their effectiveness against all known attacks. The techniques are also classified based on different factors, including the technology used, element type, and IP type. Additionally, we present a discussion on the advantages of reconfigurable-based obfuscation techniques when compared to Logic Locking techniques and the challenges associated with evaluating these techniques on hardware, primarily due to the lack of tapeouts. The survey’s findings are essential for researchers interested in hardware obfuscation and future trends in this area.

Publisher

Association for Computing Machinery (ACM)

Reference113 articles.

1. Zain Ul Abideen, Tiago Diadami Perez, Mayler Martins, and Samuel Pagliarini. 2023. A Security-aware and LUT-based CAD Flow for the Physical Synthesis of hASICs. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems (2023), 1–1.

2. Zain Ul Abideen, Tiago Diadami Perez, and Samuel Pagliarini. 2021. From FPGAs to Obfuscated eASICs: Design and Security Trade-offs. In 2021 Asian Hardware Oriented Security and Trust Symposium (AsianHOST). 1–4.

3. Achronix Data Acceleration. 2022. Speedcore Embedded FPGA IP. https://www.achronix.com/product/speedcore. Accessed: December 22, 2022.

4. Achronix Inc. 2022. Speedster7t FPGAs. https://www.achronix.com/high-speed-interfaces. Accessed: January 24, 2023.

5. Shah Agam. 2022. Europe, US warn of fake-chip danger to national security, critical systems. https://www.theregister.com/2022/03/18/eu_us_counterfeit_chips/. Accessed: September 25, 2022.

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3