WaLo: Security Primitive Generator for RT-Level Logic Locking and Watermarking

被引:2
|
作者
Kuai, Jun [1 ]
He, Jiaji [2 ]
Ma, Haocheng [1 ]
Zhao, Yiqiang [1 ]
Hou, Yumin [3 ]
Jin, Yier [3 ]
机构
[1] Tianjin Univ, Sch Microelect, Tianjin, Peoples R China
[2] Tsinghua Univ, Inst Microelect, Beijing, Peoples R China
[3] Univ Florida, Dept Elect & Comp Engn, Gainesville, FL 32611 USA
基金
美国国家科学基金会;
关键词
PROTECTION; PIRACY;
D O I
10.1109/ASIANHOST51057.2020.9358262
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Various hardware security solutions have been developed recently to help counter hardware level attacks such as hardware Trojan, integrated circuit (IC) counterfeiting and intellectual property (IP) clone/piracy. However, existing solutions often provide specific types of protections. While these solutions achieve great success in preventing even advanced hardware attacks, the compatibility of among these hardware security methods are rarely discussed. The inconsistency hampers with the development of a comprehensive solution for hardware IC and IP from various attacks. In this paper, we develop a security primitive generator to help solve the compatibility issue among different protection techniques. Specifically, we focus on two modern IC/IP protection methods, logic locking and watermarking. A combined locking and watermarking technique is developed based on enhanced finite state machines (FSMs). The security primitive generator will take user-specified constraints and automatically generate an FSM module to perform both logic locking and watermarking. The generated FSM can be integrated into any designs for protection. Our experimental results show that the generator can facilitate circuit protection and provide the flexibility for users to achieve a better tradeoff between security levels and design overheads.
引用
收藏
页数:6
相关论文
共 5 条
  • [1] WaLo: Security Primitive Generator for RT-Level Logic Locking and Watermarking
    Kuai, Jun
    He, Jiaji
    Ma, Haocheng
    Zhao, Yiqiang
    Hou, Yumin
    Jin, Yier
    Proceedings of the 2020 Asian Hardware Oriented Security and Trust Symposium, AsianHOST 2020, 2020,
  • [2] Predicate abstraction of RT-Level Verilog using symbolic simulation and constraint logic programming
    Li, Tun
    Qu, Wan-Xia
    Guo, Yang
    Liu, Gong-Jie
    Li, Si-Kun
    Jisuanji Xuebao/Chinese Journal of Computers, 2007, 30 (07): : 1138 - 1144
  • [3] Functional vectors generation for RT-Level verilog descriptions based on path enumeration and constraint logic programming
    Li, T
    Guo, Y
    Liu, GJ
    Li, SK
    DSD 2005: 8th Euromicro Conference on Digital System Design, Proceedings, 2005, : 17 - 23
  • [4] Low Overhead Logic Locking for System-Level Security: A Design Space Modeling Approach
    Lam, Long
    Melnyk, Maksym
    Zuzak, Michael
    PROCEEDINGS OF THE 29TH ACM/IEEE INTERNATIONAL SYMPOSIUM ON LOW POWER ELECTRONICS AND DESIGN, ISLPED 2024, 2024,
  • [5] Transistor-Level Camouflaged Logic Locking Method for Monolithic 3D IC Security
    Dofe, Jaya
    Yan, Chen
    Kontak, Scott
    Salman, Emre
    Yu, Qiaoyan
    PROCEEDINGS OF THE 2016 IEEE ASIAN HARDWARE ORIENTED SECURITY AND TRUST SYMPOSIUM (ASIANHOST 2016), 2016,