首页> 外文会议>IEEE International Midwest Symposium on Circuits and Systems >Efficient Functional Locking of Behavioral IPs
【24h】

Efficient Functional Locking of Behavioral IPs

机译:行为IP的有效功能锁定

获取原文

摘要

The protection of the Intellectual Property (IP) has emerged as one of the most serious areas of concerns in the semiconductor industry. Logic locking has shown to lead to good results, with little overhead against Integrated Circuit (IC) over-production and IP piracy by untrusted end-users or foundry. Unfortunately new attack techniques appear each time a new locking mechanisms is presented to exploit its weakness. Some include path sensitization and more recently SAT-based attacks. This work proposes a functional locking mechanisms for behavioral IPs (BIPs) that exploits the internal structure of behavioral descriptions when synthesized with High-Level Synthesis (HLS). In particular the generation of a Finite State Machine (FSM) and a datapath. Our proposed locking mechanism increases the key size by breaking it into multiple pieces, each applied at a unique FSM state. Applying the incorrect key at any of the states leads to an invalid results. Breaking our proposed locking mechanism is much harder than previous work as the attacker would need to try all possible permutations of keys to find the correct key, thus making this virtually unbreakable. Moreover, we insert the key at the BIP itself, which implies that the locking logic is shared with the BIP logic, hence making it more robust against removal attacks. Experimental results show that the proposed locking mechanism works very well with minimal area and delay overheads for different key sizes.
机译:知识产权(IP)的保护已成为半导体行业中最严重的关注领域之一。逻辑锁定已显示出良好的结果,而对于不受信任的最终用户或代工厂的集成电路(IC)过度生产和IP盗版所产生的开销却很小。不幸的是,每当提出一种新的锁定机制来利用其弱点时,就会出现新的攻击技术。其中包括路径敏感性和最近基于SAT的攻击。这项工作提出了一种针对行为IP(BIP)的功能锁定机制,该机制在与高级综合(HLS)进行综合时利用了行为描述的内部结构。特别是有限状态机(FSM)和数据路径的生成。我们提出的锁定机制通过将密钥分成多个部分来增加密钥大小,每个部分都以唯一的FSM状态应用。在任何状态下应用错误的密钥都会导致无效的结果。破解我们提出的锁定机制比以前的工作要困难得多,因为攻击者需要尝试所有可能的密钥排列以找到正确的密钥,从而使这种破解几乎牢不可破。此外,我们将密钥插入到BIP本身,这意味着锁定逻辑与BIP逻辑共享,因此使其对删除攻击更为健壮。实验结果表明,对于不同的密钥大小,所提出的锁定机制非常有效,并且具有最小的面积和延迟开销。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号