ReTrustFSM: Toward RTL Hardware Obfuscation-A Hybrid FSM Approach

被引:7
|
作者
Rahman, M. Sazadur [1 ]
Guo, Rui [1 ]
Kamali, Hadi M. [1 ]
Rahman, Fahim [1 ]
Farahmandi, Farimah [1 ]
Tehranipoor, Mark [1 ]
机构
[1] Univ Florida, Dept Elect & Comp Engn, Gainesville, FL 32611 USA
关键词
Electronics packaging; Logic gates; Robustness; Hardware; IP networks; Supply chains; Hardware obfuscation; logic locking; FSM; RTL; structural analysis; BMC; LOGIC LOCKING; SAT;
D O I
10.1109/ACCESS.2023.3244902
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Hardware obfuscating is a proactive design-for-trust technique against IC supply chain threats, i.e., IP piracy and overproduction. Many studies have evaluated numerous techniques for obfuscation purposes. Nevertheless, de-obfuscation attacks have demonstrated their insufficiency. This paper proposes a register-transfer (RT) level finite-state-machine (FSM) obfuscation technique called ReTrustFSM that allows designers to obfuscate at the earliest possible stage. ReTrustFSM combines three types of secrecy: explicit external secrecy via an external key, implicit external secrecy based on specific clock cycles, and internal secrecy through a concealed FSM transition function. So, the robustness of ReTrustFSM relies on the external key, the external primary input patterns, and the cycle accuracy of applying such external stimuli. Additionally, ReTrustFSM defines a cohesive relationship between the features of Boolean problems and the required time for de-obfuscation, ensuring a maximum execution time for oracle-guided de-obfuscation attacks. Various attacks are employed to test ReTrustFSM's robustness, including structural and machine learning attacks, functional I/O queries (BMC), and FSM attacks. We have also analyzed the corruptibility and overhead of design-under-obfuscation. Our experimental results demonstrate the robustness of ReTrustFSM at acceptable overhead/corruption while resisting such threat models.
引用
收藏
页码:19741 / 19761
页数:21
相关论文
共 50 条
  • [41] Wealth Inequality: A Hybrid Approach Toward Multidimensional Distributional National Accounts In Europe
    Waltl, Sofie R.
    REVIEW OF INCOME AND WEALTH, 2022, 68 (01) : 74 - 108
  • [42] Toward Terminal-to-Terminal Communication Networks: A Hybrid MANET and DTN Approach
    Kawamoto, Yuichi
    Nishiyama, Hiroki
    Kato, Nei
    2013 IEEE 18TH INTERNATIONAL WORKSHOP ON COMPUTER AIDED MODELING AND DESIGN OF COMMUNICATION LINKS AND NETWORKS (CAMAD), 2013, : 228 - 232
  • [43] Toward Efficient Intrusion Detection System Using Hybrid Deep Learning Approach
    Aldallal, Ammar
    SYMMETRY-BASEL, 2022, 14 (09):
  • [44] A Hybrid Approach Toward Efficient and Accurate Intrusion Detection for In-Vehicle Networks
    Zhang, Linxi
    Ma, Di
    IEEE ACCESS, 2022, 10 : 10852 - 10866
  • [45] A Force Compensation Approach Toward Divergence of Hardware-in-the-Loop Contact Simulation System for Damped Elastic Contact
    Qi, Chenkun
    Gao, Feng
    Zhao, Xianchao
    Ren, Anye
    Wang, Qian
    IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, 2017, 64 (04) : 2933 - 2943
  • [46] Toward hardware building blocks for software-only real-time video processing: The MOVIE approach
    Charot, F
    Le Fol, G
    Lemonnier, P
    Wagner, C
    Barzic, R
    Bouville, C
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 1999, 9 (06) : 882 - 894
  • [47] Register transfer level approach to hybrid time and hardware redundancy based fault secure datapath synthesis
    Wu, KJ
    Karri, R
    INTERNATIONAL TEST CONFERENCE 2003, PROCEEDINGS, 2003, : 902 - 911
  • [48] DL-Sort: A Hybrid Approach to Scalable Hardware-Accelerated Fully-Streaming Sorting
    Oh, Hyun Woo
    Park, Joungmin
    Lee, Seung Eun
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II-EXPRESS BRIEFS, 2024, 71 (05) : 2549 - 2553
  • [49] MANAGING HARDWARE IMPAIRMENTS IN HYBRID MILLIMETER WAVE MIMO SYSTEMS: A DICTIONARY LEARNING-BASED APPROACH
    Palacios, Joan
    Gonzalez-Prelcic, Nuria
    Widmer, Joerg
    CONFERENCE RECORD OF THE 2019 FIFTY-THIRD ASILOMAR CONFERENCE ON SIGNALS, SYSTEMS & COMPUTERS, 2019, : 168 - 172
  • [50] A hybrid approach toward security-constrained reactive power planning in electricity markets
    Parida, S. K.
    Singh, S. N.
    Srivastava, S. C.
    ELECTRIC POWER COMPONENTS AND SYSTEMS, 2008, 36 (06) : 649 - 663