Optimizing RTL Code Obfuscation: New Methods Based on XML Syntax Tree
-
Published:2023-12-27
Issue:1
Volume:14
Page:243
-
ISSN:2076-3417
-
Container-title:Applied Sciences
-
language:en
-
Short-container-title:Applied Sciences
Author:
Yi Hanwen1, Zhang Jin1ORCID, Liu Sheng23
Affiliation:
1. School of Computer and Communication Engineering, Changsha University of Science and Technology, Changsha 410114, China 2. College of Computer Science and Technology, National University of Defense Technology, Changsha 410073, China 3. Key Laboratory of Advanced Microprocessor Chips and Systems, National University of Defense Technology, Changsha 410073, China
Abstract
As the most widely used description code in digital circuits and system on chip (SoC), the security of register transfer level (RTL) code is extremely critical. Code obfuscation is a typical method to ensure the security of RTL code, but popular obfuscation methods are not fully applicable to RTL code. In addition, some RTL code obfuscation tools also have issues with incomplete functionality or obfuscation errors. In view of the above issues, this paper studies the RTL code security problem represented by obfuscation. Based on the extensible markup language (XML) syntax tree generated by parsing RTL code, a complete RTL code refactoring model is constructed, and four targeted RTL code obfuscation methods are proposed, namely: Layout obfuscation; Parameter obfuscation; Critical path obfuscation; Code increment obfuscation. Utilizing the developed obfuscation tool, an assessment of the performance and effectiveness of the obfuscation methods is conducted, alongside testing the equivalence between the obfuscated code and the source code. The experimental results show that the proposed obfuscation methods have higher practicability and reliability, and have the characteristics of high obfuscation coverage that can be stable at over 98% and preservation of compiler indicative Comments.
Funder
National Natural Science Foundation of China Research on High-performance Molecular Dynamics Simulation Technology National Defense Science and Technology Key Laboratory Fund Project Research on High Energy Efficiency Microprocessor technology and the Key Laboratory of Advanced Microprocessor Chips and Systems
Subject
Fluid Flow and Transfer Processes,Computer Science Applications,Process Chemistry and Technology,General Engineering,Instrumentation,General Materials Science
Reference21 articles.
1. The development of China’s integrated circuit industry: Review of the “13th Five-Year Plan” and the outlook of the “14th Five-Year Plan”;Li;Mod. Econ. Res.,2021 2. (2023, December 07). Arm Sues Qualcomm for Destruction of Related Chip Designs. Available online: https://new.qq.com/rain/a/20220902A00XVY00. 3. A review of research on code obfuscation techniques;Li;Software,2020 4. Speith, J., Schweins, F., Ender, M., Fyrbiak, M., May, A., and Paar, C. (2022, January 23–26). How Not to Protect Your IP—An Industry-Wide Break of IEEE 1735 Implementations. Proceedings of the 2022 IEEE Symposium on Security and Privacy (SP), San Francisco, CA, USA. 5. Collberg, C., Thomborson, C., and Low, D. (1997). A Taxonomy of Obfuscating Transformations, Department of Computer Science, The University of Auckland.
|
|