Intellectual property (IP) theft is one of the major concerns for the economy of semiconductor companies, costing billions of dollars every year. To make unauthorized IP copies, an attacker must reverse engineer and replicate the functionality of the given chip design. While the existing IP protection techniques aim at manipulating HDL descriptions to thwart the reverse engineering process, they focus on the given implementation and fail in hiding all details of the chip functionality. We propose a comprehensive solution to address this problem during high-level synthesis in order to apply obfuscation at the algorithm level. Our solution includes several key-based transformations that are applied during component generation to make reverse engineering harder during chip fabrication, while the key is later provided to the circuit to unlock the functionality. We show that our method is a promising approach to obfuscate large-scale designs despite the obfuscation overhead.
Protecting Hardware IP Cores During High-Level Synthesis
Pilato, Christian;Sciuto, Donatella;
2022-01-01
Abstract
Intellectual property (IP) theft is one of the major concerns for the economy of semiconductor companies, costing billions of dollars every year. To make unauthorized IP copies, an attacker must reverse engineer and replicate the functionality of the given chip design. While the existing IP protection techniques aim at manipulating HDL descriptions to thwart the reverse engineering process, they focus on the given implementation and fail in hiding all details of the chip functionality. We propose a comprehensive solution to address this problem during high-level synthesis in order to apply obfuscation at the algorithm level. Our solution includes several key-based transformations that are applied during component generation to make reverse engineering harder during chip fabrication, while the key is later provided to the circuit to unlock the functionality. We show that our method is a promising approach to obfuscate large-scale designs despite the obfuscation overhead.File | Dimensione | Formato | |
---|---|---|---|
Chapter_Obfuscation.pdf
accesso aperto
:
Post-Print (DRAFT o Author’s Accepted Manuscript-AAM)
Dimensione
480.91 kB
Formato
Adobe PDF
|
480.91 kB | Adobe PDF | Visualizza/Apri |
I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.