Intellectual property (IP) theft is one of the major concerns for the economy of semiconductor companies, costing billions of dollars every year. To make unauthorized IP copies, an attacker must reverse engineer and replicate the functionality of the given chip design. While the existing IP protection techniques aim at manipulating HDL descriptions to thwart the reverse engineering process, they focus on the given implementation and fail in hiding all details of the chip functionality. We propose a comprehensive solution to address this problem during high-level synthesis in order to apply obfuscation at the algorithm level. Our solution includes several key-based transformations that are applied during component generation to make reverse engineering harder during chip fabrication, while the key is later provided to the circuit to unlock the functionality. We show that our method is a promising approach to obfuscate large-scale designs despite the obfuscation overhead.

Protecting Hardware IP Cores During High-Level Synthesis

Pilato, Christian;Sciuto, Donatella;
2022-01-01

Abstract

Intellectual property (IP) theft is one of the major concerns for the economy of semiconductor companies, costing billions of dollars every year. To make unauthorized IP copies, an attacker must reverse engineer and replicate the functionality of the given chip design. While the existing IP protection techniques aim at manipulating HDL descriptions to thwart the reverse engineering process, they focus on the given implementation and fail in hiding all details of the chip functionality. We propose a comprehensive solution to address this problem during high-level synthesis in order to apply obfuscation at the algorithm level. Our solution includes several key-based transformations that are applied during component generation to make reverse engineering harder during chip fabrication, while the key is later provided to the circuit to unlock the functionality. We show that our method is a promising approach to obfuscate large-scale designs despite the obfuscation overhead.
2022
Behavioral Synthesis for Hardware Security
978-3-030-78840-7
978-3-030-78841-4
High-level synthesis
IP protection
Obfuscation
Untrusted foundry
Integrated circuits
Hardware security
File in questo prodotto:
File Dimensione Formato  
Chapter_Obfuscation.pdf

accesso aperto

: Post-Print (DRAFT o Author’s Accepted Manuscript-AAM)
Dimensione 480.91 kB
Formato Adobe PDF
480.91 kB Adobe PDF Visualizza/Apri

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11311/1200376
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 0
  • ???jsp.display-item.citation.isi??? ND
social impact