ReTrustFSM: Toward RTL Hardware Obfuscation-A Hybrid FSM Approach

被引:7
|
作者
Rahman, M. Sazadur [1 ]
Guo, Rui [1 ]
Kamali, Hadi M. [1 ]
Rahman, Fahim [1 ]
Farahmandi, Farimah [1 ]
Tehranipoor, Mark [1 ]
机构
[1] Univ Florida, Dept Elect & Comp Engn, Gainesville, FL 32611 USA
关键词
Electronics packaging; Logic gates; Robustness; Hardware; IP networks; Supply chains; Hardware obfuscation; logic locking; FSM; RTL; structural analysis; BMC; LOGIC LOCKING; SAT;
D O I
10.1109/ACCESS.2023.3244902
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Hardware obfuscating is a proactive design-for-trust technique against IC supply chain threats, i.e., IP piracy and overproduction. Many studies have evaluated numerous techniques for obfuscation purposes. Nevertheless, de-obfuscation attacks have demonstrated their insufficiency. This paper proposes a register-transfer (RT) level finite-state-machine (FSM) obfuscation technique called ReTrustFSM that allows designers to obfuscate at the earliest possible stage. ReTrustFSM combines three types of secrecy: explicit external secrecy via an external key, implicit external secrecy based on specific clock cycles, and internal secrecy through a concealed FSM transition function. So, the robustness of ReTrustFSM relies on the external key, the external primary input patterns, and the cycle accuracy of applying such external stimuli. Additionally, ReTrustFSM defines a cohesive relationship between the features of Boolean problems and the required time for de-obfuscation, ensuring a maximum execution time for oracle-guided de-obfuscation attacks. Various attacks are employed to test ReTrustFSM's robustness, including structural and machine learning attacks, functional I/O queries (BMC), and FSM attacks. We have also analyzed the corruptibility and overhead of design-under-obfuscation. Our experimental results demonstrate the robustness of ReTrustFSM at acceptable overhead/corruption while resisting such threat models.
引用
收藏
页码:19741 / 19761
页数:21
相关论文
共 50 条
  • [1] RTL Interconnect Obfuscation By Polymorphic Switch Boxes For Secure Hardware Generation
    Chakraborty, Haimanti
    Vemuri, Ranga
    2024 25TH INTERNATIONAL SYMPOSIUM ON QUALITY ELECTRONIC DESIGN, ISQED 2024, 2024,
  • [2] A Low Cost MST-FSM Obfuscation Method for Hardware IP Protection
    Zhang, Yuejun
    Pan, Zhao
    Wang, Pengjun
    Zhang, Xiaowei
    JOURNAL OF CIRCUITS SYSTEMS AND COMPUTERS, 2020, 29 (13)
  • [3] Enhancing Data Security using Obfuscated 128-bit AES Algorithm - An Active Hardware Obfuscation Approach at RTL Level
    Chhabra, Surbhi
    Lata, Kusum
    2018 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2018, : 401 - 406
  • [4] RTL Hardware IP Protection Using Key-Based Control and Data Flow Obfuscation
    Chakraborty, Rajat Subhra
    Bhunia, Swarup
    23RD INTERNATIONAL CONFERENCE ON VLSI DESIGN, 2010, : 405 - 410
  • [5] Ephemeral Key-based Hybrid Hardware Obfuscation
    Nasir, Neelam
    Ali Malik, Arsalan
    Tahir, Ifra
    Masood, Ammar
    Riaz, Naveed
    Proceedings of 2022 19th International Bhurban Conference on Applied Sciences and Technology, IBCAST 2022, 2022, : 646 - 652
  • [6] A novel formal verification approach for RTL hardware IP cores
    Djemal, R
    Dhouib, MA
    Dellacherie, S
    Tourki, R
    COMPUTER STANDARDS & INTERFACES, 2005, 27 (06) : 637 - 651
  • [7] Hardware signature generation using a hybrid PUF and FSM model for an SOC architecture
    Kokila J.
    Das A.M.
    Begum B.S.
    Ramasubramanian N.
    Periodica polytechnica Electrical engineering and computer science, 2019, 63 (04): : 244 - 253
  • [8] A hybrid hardware accelerated approach for tomographic reconstruction
    Temkin, JM
    Schmiederer, J
    2002 INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, VOL II, PROCEEDINGS, 2002, : 637 - 640
  • [9] Extended abstract: A formal design approach from software oriented UML descriptions to hardware oriented RTL
    Fujita, M
    Third ACM & IEEE International Conference on Formal Methods and Models for Co-Design, Proceedings, 2005, : 241 - 242
  • [10] Toward a Hybrid Approach for Crowd Simulation
    Rabiaa, Chighoub
    Foudil, Cherif
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2016, 7 (01) : 52 - 61