Affiliation:
1. Department of Electrical and Electronic Engineering, Bangladesh University of Engineering and Technology, Dhaka 1205, Bangladesh
Abstract
This paper proposes a new framework for post-synthesis obfuscation of digital circuits using a mixture of cells combined with an Anti-SAT block. Furthermore, a novel integrated framework has been established wherein obfuscation, along with Anti-SAT and validation of the benchmarks, progress through MATLAB®, Python, Cadence RTL Encounter® and Cadence LEC® to implement the proposed methodology. Area, delay, leakage power and total power are adopted as elements of the evaluation matrix. These parameters are compared between the original circuit, the circuit after obfuscation, the circuit after integration with Anti-SAT and the circuit after implementation of the proposed method of multiple-cell obfuscation with Anti-SAT. The probability of breaking a circuit is taken as the security criterion. It is mathematically proven that as the number of types of obfuscated cells used increases, then the probability of breaking the circuit decreases. The results obtained accord with the mathematical proof. The framework minimizes the delay by inserting obfuscation cells (OCs) in the non-critical paths, strengthens the security by using several types of OCs and allows the user to select a design based on justified area, leakage power and total power. However, against a Boolean SATisfiability (SAT) attack, obfuscation with multiple cells is not a sufficient defense. An Anti-SAT block performs better than obfuscation but has its own limitations. Thus, use of an Anti-SAT block in combination with multiple-cell obfuscation is proposed and implemented, giving better results against an efficient SAT attack. The number of iterations, as well as runtime to obtain the correct keys, increase significantly for the Anti-SAT block combined with multiple-cell obfuscation compared to the Anti-SAT or obfuscation block alone.
Subject
Electrical and Electronic Engineering,Computer Networks and Communications,Hardware and Architecture,Signal Processing,Control and Systems Engineering
Reference37 articles.
1. Development and Evaluation of Hardware Obfuscation Benchmarks;Amir;J. Hardw. Syst. Secur.,2018
2. Karmakar, R., Prasad, N., Chattopadhyay, S., Kapur, R., and Sengupta, I. (2017, January 7–11). A New Logic Encryption Strategy Ensuring Key Interdependency. Proceedings of the International Conference on VLSI Design and International Conference on Embedded Systems (VLSID), Hyderabad, India.
3. (2021, November 20). Trends in the Global IC Design Service Market. DIGITIMES Research. Available online: http://www.digitimes.com/news/a20120313RS400.html?chid=2.
4. Hardware/Software Cross-Layer Technologies for Trustworthy and Secure Computing;Hu;IEEE Trans. Multi-Scale Comput. Syst.,2016
5. Integrated Circuit Security Threats and Hardware Assurance Countermeasures;Goertzel;CrossTalk,2013