Affiliation:
1. University of California, One Shields Avenue, Davis, CA, USA
2. George Mason University, Fairfax, VA, USA
3. San Francisco State University, San Francisco, CA, USA
Abstract
Logic locking and Integrated Circuit (IC) camouflaging are the most prevalent protection schemes that can thwart most hardware security threats. However, the state-of-the-art attacks, including Boolean Satisfiability (SAT) and approximation-based attacks, question the efficacy of the existing defense schemes. Recent obfuscation schemes have employed reconfigurable logic to secure designs against various hardware security threats. However, they have focused on specific design elements such as SAT hardness. Despite meeting the focused criterion such as security, obfuscation incurs additional overheads, which are not evaluated in the present works. This work provides an extensive analysis of Look-up-table (LUT)–based obfuscation by exploring several factors such as LUT technology, size, number of LUTs, and replacement strategy as they have a substantial influence on Power-Performance-Area (PPA) and Security (PPA/S) of the design. We show that using large LUT makes LUT-based obfuscation resilient to hardware security threats. However, it also results in enormous design overheads beyond practical limits.
To make the reconfigurable logic obfuscation efficient in terms of design overheads, this work proposes a novel LUT architecture where the security provided by the proposed primitive is superior to that of the traditional LUT-based obfuscation. Moreover, we leverage the security-driven design flow, which uses off-the-shelf industrial EDA tools to mitigate the design overheads further while being non-disruptive to the current industrial physical design flow. We empirically evaluate the security of the LUTs against state-of-the-art obfuscation techniques in terms of design overheads and SAT-attack resiliency. Our findings show that the proposed primitive significantly reduces both area and power by a factor of 8
\( \times \)
and 2
\( \times \)
, respectively, without compromising security.
Funder
Defense Advanced Research Projects Agency
NSF CHEST IUCRC Industrial Support
Publisher
Association for Computing Machinery (ACM)
Subject
Electrical and Electronic Engineering,Computer Graphics and Computer-Aided Design,Computer Science Applications
Reference54 articles.
1. Yousra M. Alkabani and Farinaz Koushanfar. 2007. Active hardware metering for intellectual property protection and security. In Proceedings of the 16th USENIX Security Symposium on USENIX Security Symposium (SS’07). USENIX Association, Article 20, 16 pages. Retrieved from http://dl.acm.org/citation.cfm?id=1362903.1362923.
2. Static Design of Spin Transfer Torques Magnetic Look Up Tables for ASIC Designs
3. Static Design of Spin Transfer Torques Magnetic Look Up Tables for ASIC Designs
4. SMT Attack: Next Generation Attack on Obfuscated Circuits with Capabilities and Performance Beyond the SAT Attacks
5. Preventing IC Piracy Using Reconfigurable Logic Barriers
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. A Security-Aware and LUT-Based CAD Flow for the Physical Synthesis of hASICs;IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems;2023-10