A New Optimal Method for the Secure Design of Combinational Circuits against Hardware Trojans Using Interference Logic Locking
-
Published:2023-02-23
Issue:5
Volume:12
Page:1107
-
ISSN:2079-9292
-
Container-title:Electronics
-
language:en
-
Short-container-title:Electronics
Author:
Mirmohammadi Zahra1, Etemadi Borujeni Shahram1
Affiliation:
1. Faculty of Computer Engineering, University of Isfahan, Isfahan 8174673441, Iran
Abstract
Effective resistance to intellectual property theft, reverse engineering, and hardware Trojan insertion in integrated circuit supply chains is increasingly essential, for which many solutions have been proposed. Accordingly, strong attacks are also designed in this field. One way to achieve the above goal is obfuscation. The hardware obfuscation method hides the primary function of the circuit and the normal Netlist from the attacker by adding several key gates in the original Netlist. The functionality circuit is correct only if the correct key is applied; otherwise, the circuit is obfuscated. In recent years, various obfuscation methods have been proposed. One is logic locking, the most prominent hardware protection technique since it can protect against untrusted items. Logic locking induces functional and structural changes to a design even before the layout generation. We secured the circuit against hardware Trojan insertion with a secure logic locking method based on the insertion of key gates in interference mode. We call our proposed method Secure Interference Logic Locking, SILL. SILL is based on minimum controllability in paths with maximum fan-out. In this method, we have reduced the number of key gates required for circuit obfuscation and created the maximum Hamming distance between normal and obscure outputs. In addition, the key gates are added to the circuit’s complete interference, and the AES algorithm is used to generate the key. Our proposed method, SILL, was simulated in the Vivado simulation environment; the algorithms used in this method were prepared in VHDL language and designed to allow parallel execution, then applied on the original Netlist of the ISCAS85 benchmark circuits. By analyzing and comparing the results of this simulation to recent works, the amount of hardware consumption has decreased (about 5% space consumption and about a 0.15-nanosecond time delay). Then, the SAT attack algorithm was tested on ISCAS85 benchmark circuits that were obfuscated with SILL. The execution time of the attack in the second attempt was 0.24 nanoseconds longer compared to similar recent works, and it timed out in the fourth attempt. The resistance of our proposed method, having less hardware overhead and higher speed is more effective against SAT attacks than the existing conventional methods.
Subject
Electrical and Electronic Engineering,Computer Networks and Communications,Hardware and Architecture,Signal Processing,Control and Systems Engineering
Reference36 articles.
1. Chakraborty, P., Cruz, J., and Bhunia, S. (2018, January 17–18). SAIL: Machine Learning Guided Structural Analysis Attack on Hardware Obfuscation. Proceedings of the 2018 Asian Hardware Oriented Security and Trust Symposium (AsianHOST), Hong Kong, China. 2. Guo, Z., Xu, X., Tehranipoor, M.M., and Forte, D. (2019). EOP: An Encryption-Obfuscation Solution for Protecting PCBs Against Tampering and Reverse Engineering. arXiv. 3. Knechtel, J., Patnaik, S., and Sinanoglu, O. (2019, January 5–7). Protect Your Chip Design Intellectual Property: An Overview. Proceedings of the International Conference on Omni-Layer Intelligent Systems, Crete, Greece. 4. Das, M. (2016). Preventive Techniques for Hardware Trojans. [Master’s Thesis, Masaryk University, Faculty of Informatics]. 5. Yasin, M., Mazumdar, B., Rajendran, J., and Sinanoglu, O. (2017, January 14). On Improving the Security of Logic Locking. Proceedings of the 2017 IEEE International Test Conference (ITC), Fort Worth, TX, USA.
|
|