Hardware IP Protection against Confidentiality Attacks and Evolving Role of CAD Tool (Invited Paper)

被引:0
|
作者
Bhunia, Swarup [1 ]
Das, Amitabh [2 ]
Fazzari, Saverio [3 ]
Kammler, Vivian [4 ]
Kehlet, David [5 ]
Rajendran, Jeyavijayan [6 ]
Srivastava, Ankur [7 ]
机构
[1] Univ Florida, Gainesville, FL 32611 USA
[2] AMD, Santa Clara, CA USA
[3] Booz Allen Hamilton, Mclean, VA USA
[4] Sandia Natl Labs, Albuquerque, NM USA
[5] Intel, Santa Clara, CA USA
[6] Texas A&M Univ, College Stn, TX USA
[7] Univ Maryland, College Pk, MD USA
关键词
IP Protection; Confidentiality; Semiconductor Supply Chain; CAD Tool; Security Analysis; Reverse Engineering; Piracy; Extraction of Design Secrets; Logic Locking; Obfuscation; Metrics; OBFUSCATION; PIRACY;
D O I
10.1145/3508352.3561103
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
With growing use of hardware intellectual property (IP) based integrated circuits (IC) design and increasing reliance on a globalized supply chain, the threats to confidentiality of hardware IPs have emerged as major security concerns to the IP producers and owners. These threats are diverse, including reverse engineering (RE), piracy, cloning, and extraction of design secrets, and span different phases of electronics life cycle. The academic research community and the semiconductor industry have made significant efforts over the past decade on developing effective methodologies and CAD tools targeted to protect hardware IPs against these threats. These solutions include watermarking, logic locking, obfuscation, camouflaging, split manufacturing, and hardware redaction. This paper focuses on key topics on confidentiality of hardware IPs encompassing the major threats, protection approaches, security analysis, and metrics. It discusses the strengths and limitations of the major solutions in protecting hardware IPs against the confidentiality attacks, and future directions to address the limitations in the modern supply chain ecosystem.
引用
收藏
页数:8
相关论文
共 17 条
  • [1] Reconfigurable Logic for Hardware IP Protection: Opportunities and Challenges (Invited Paper)
    Collini, Luca
    Tan, Benjamin
    Pilato, Christian
    Karri, Ramesh
    2022 IEEE/ACM INTERNATIONAL CONFERENCE ON COMPUTER AIDED DESIGN, ICCAD, 2022,
  • [2] TaintLock: Hardware IP Protection Against Oracle-Guided and Oracle-Reconstruction Attacks
    Talukdar, Jonti
    Chaudhuri, Arjun
    Ortega, Eduardo
    Chakrabarty, Krishnendu
    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2025, 44 (01) : 357 - 370
  • [3] Fragile HFSM Watermarking Hardware IP Authentication CAD Tool
    Sbukry, Samar M. Hussein
    Abdel-Hamid, Amr T.
    Dessouky, Mohamed
    2020 9TH INTERNATIONAL CONFERENCE ON MODERN CIRCUITS AND SYSTEMS TECHNOLOGIES (MOCAST), 2020,
  • [4] Sequences, DFT and Resistance against Fast Algebraic Attacks (Invited Paper)
    Gong, Guang
    SEQUENCES AND THEIR APPLICATIONS - SETA 2008, 2008, 5203 : 197 - 218
  • [5] Protection Against Hardware Trojan Attacks: Towards a Comprehensive Solution
    Bhunia, Swarup
    Abramovici, Miron
    Agrawal, Dakshi
    Bradley, Paul
    Hsiao, Michael S.
    Plusquellic, Jim
    Tehranipoor, Mohammad
    IEEE DESIGN & TEST, 2013, 30 (03) : 6 - 17
  • [6] AI-Driven Assurance of Hardware IP against Reverse Engineering Attacks
    Chakraborty, Prabuddha
    Bhunia, Swarup
    2022 IEEE INTERNATIONAL TEST CONFERENCE (ITC), 2022, : 627 - 636
  • [7] Securing IP multimedia subsystem (IMS) infrastructures: protection against attacks
    Tsagkaropoulos, Michail
    Politis, Ilias
    Dagiuklas, Tasos
    Kotsopoulos, Stavros
    JOURNAL OF THE INSTITUTE OF TELECOMMUNICATIONS PROFESSIONALS, 2008, 2 : 49 - 54
  • [8] Hardware IP Assurance against Trojan Attacks with Machine Learning and Post-processing
    Gaikwad, Pravin
    Cruz, Jonathan
    Chakraborty, Prabuddha
    Bhunia, Swarup
    Hoque, Tamzidul
    ACM JOURNAL ON EMERGING TECHNOLOGIES IN COMPUTING SYSTEMS, 2023, 19 (03)
  • [9] Deceptive Logic Locking for Hardware Integrity Protection Against Machine Learning Attacks
    Sisejkovic, Dominik
    Merchant, Farhad
    Reimann, Lennart M.
    Leupers, Rainer
    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2022, 41 (06) : 1716 - 1729
  • [10] IC security and quality improvement by protection of chip backside against hardware attacks
    Amini, E.
    Beyreuther, A.
    Herfurth, N.
    Steigert, A.
    Muydinov, R.
    Szyszka, B.
    Boit, C.
    MICROELECTRONICS RELIABILITY, 2018, 88-90 : 22 - 25