Professional Documents
Culture Documents
Abstract— A number of studies of hardware security aim to thwart purchased IC by image processing-based RE [4], an adversary would
piracy, overbuilding, and reverse engineering (RE) by obfuscating and/or infer the key according to the type of inserted gates. In order to
camouflaging. However, these techniques incur high overheads, and
avoid this problem, the authors proposed to replace an XOR gate with
integrated circuit (IC) camouflaging cannot provide any protection for
the gate-level netlist of the third party intellectual property (IP) core or an XNOR gate and an inverter and, similarly, replace XNOR gates
the single large monolithic IC. In order to circumvent these weaknesses, with XOR gates and inverters, and move inversions further up or
this brief elaborately analyzes these hardware security techniques and down using de Morgan’s law [3]. However, this approach incurs
proposes a practical logic obfuscation method with low overheads to high area and power overheads due to the logic redesign caused by
prevent an adversary from RE both the gate-level netlist and the
layout-level geometry of IP/IC and protect IP/IC from piracy and de Morgan’s rules. The experimental results show that when the
overbuilding. Experimental evaluations demonstrate the low area, power, number of key gates inserted is 5% of the number of gates in
and zero performance overhead of the proposed obfuscation technique. the original ISCAS-85 combinational benchmarks, the area overhead
and the power-delay product overhead for random insertion yields
Index Terms— Hardware security, intellectual property (IP)
protection, logic obfuscation, overbuilding, physical unclonable an average overhead of about 26% and 25%, respectively [12].
function (PUF), piracy, reverse engineering (RE). Our proposed obfuscation structure bypasses the need for expen-
sive redesign. In addition, some sequential logic obfuscation
methods [2], [8], [11], [16], [17] are also proposed.
I. I NTRODUCTION
With globalization of integrated circuit (IC) design, IC piracy, B. IC Camouflaging
overbuilding, and reverse engineering (RE) have become major IC camouflaging can resist the image processing-based extraction
challenges for the electronics and defense industries. It was estimated of a gate-level netlist from an IC using dummy contacts [5] or
that the cost of counterfeiting and piracy for G20 nations was building lookalike standard cells designed with the same physical
U.S. $450–650 billion in 2008 and will grow to U.S. $1.2–1.7 trillion layout to implement different logic gates [6] or filling unused spaces
in 2015 [1]. In general, pirated ICs not only have a negative impact in an IC with filler cells [7]. IC camouflaging is a layout technique
on brand reputation and research and development efforts but also hence can provide an additional layout layer of defense beyond
might have serious impact on systems and operations. Particularly, an the logic obfuscation. However, the ever increasing complexity of
untrusted manufacturer can also produce more chips than authorized IC designs asks for a modular design model, where IPs are
chips, at a marginal cost, and sell them illegally (overbuilding), and integrated into a system-on-chip (SoC). To enable the model,
an untrusted party can also extract a gate-level netlist by RE the the availability of IP protection for third party IPs (3PIPs)
design to steal the valuable intellectual property (IP)/IC information, is also imperative. IC camouflaging cannot provide the secu-
even illegally integrate it into his own IC or directly sell it as an rity protection for the gate-level netlist of 3PIP/IC since it
IP core. is a layout technique. The experimental results show that
Recent works in the hardware security aim to thwart the piracy, IC camouflaging also brings high overheads [13].
overbuilding, and RE by obfuscating and/or camouflaging. However,
they suffer from several issues. Below we will introduce these C. PC-Based Obfuscation
techniques in detail and analyze the limitations of them.
Koushanfar and Qu [9] proposed the first passive hardware
metering method that assigns a unique signature to each
II. R ECENT W ORKS IN H ARDWARE S ECURITY IC’s functionality by integrating a small programmable part to the
A. Combinational Logic Obfuscation ASIC to prevent IC overbuilding. Baumgarten et al. [10] proposed
The logic obfuscation technique is one of the most popular to replace a part of logic gates in a design with some programmable
IC protection techniques. Roy et al. [3] proposed a classical com- components (PC) such as RAMs to prevent IC piracy, and the content
binatorial logic obfuscation method that obfuscates the IC designs of RAMs will be configured after manufacturing of the chips, which
by randomly inserting additional key gates (XOR or XNOR). One of does not disclose the entire schematic to the foundry. Therefore, the
the inputs to a key gate is the functional input in the design and the PC-based obfuscation can prevent attackers to RE the IC. However,
other is 1-bit key input. The correct key will be stored in a tamper- the use of PC will incur significant performance overhead because
evident memory inside the design to prevent access to attackers. Upon of the additional mask layer requirements [11].
applying the correct key, the obfuscated design will exhibit a correct
function. The logic obfuscation can protect the IC from piracy and D. Summary
overbuilding. However, if the gate-level netlist is extracted from the In order to prevent the key from being inferred according to the
Manuscript received September 16, 2014; revised January 4, 2015 and type of inserted gates if the gate-level netlist is extracted by RE,
March 4, 2015; accepted April 26, 2015. Date of publication June 18, 2015; the combinational logic obfuscation technique needs to redesign the
date of current version February 23, 2016. logic of design and hence brings high area and power overheads.
The author is with Software College, Northeastern University, PC-based obfuscation techniques incur significant performance over-
Shenyang 110819, China (e-mail: zhangjl@swc.neu.edu.cn).
Color versions of one or more of the figures in this paper are available
head and need to modify traditional electronic design automation
online at http://ieeexplore.ieee.org. flow to support their design method due to the use of RAMs. IC
Digital Object Identifier 10.1109/TVLSI.2015.2437996 camouflaging also incurs high overheads and cannot prevent IC from
1063-8210 © 2015 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.
See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
Authorized licensed use limited to: K.L. University(F.K.A. Koneru Lakshmaiah College of Engineering). Downloaded on October 21,2021 at 03:53:07 UTC from IEEE Xplore. Restrictions apply.
1194 IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, VOL. 24, NO. 3, MARCH 2016
Authorized licensed use limited to: K.L. University(F.K.A. Koneru Lakshmaiah College of Engineering). Downloaded on October 21,2021 at 03:53:07 UTC from IEEE Xplore. Restrictions apply.
IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, VOL. 24, NO. 3, MARCH 2016 1195
C. Gate-Level Netlist RE
As shown in Fig. 2(b), a circuit obfuscated with the camouflaging
method [13], which is a layout-level obfuscation technique that can
resist the circuit extraction-based RE. However, it fails to protect the
gate-level netlist from RE. In practice, the ever increasing complexity
Fig. 3. PUF-based obfuscation and the generation of the licenses.
of IC designs asks for the protection of gate-level netlist of 3PIPs,
which are integrated into an SoC by system developers. The proposed
obfuscation technique in this brief can be automatically performed
in gate-level netlist. Therefore, the gate-level netlist and all the
following levels of gate level including the layout-level netlists and
the manufactured chips would be protected.
Authorized licensed use limited to: K.L. University(F.K.A. Koneru Lakshmaiah College of Engineering). Downloaded on October 21,2021 at 03:53:07 UTC from IEEE Xplore. Restrictions apply.
1196 IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, VOL. 24, NO. 3, MARCH 2016
TABLE I
A REA , D ELAY, AND P OWER OVERHEAD FOR O UR P ROPOSED O BFUSCATION M ETHOD
VI. C ONCLUSION
In this brief, we have comprehensively analyzed the current
hardware security techniques and developed a practical and very
efficient combinational logic obfuscation technique to thwart piracy,
overbuilding, and RE attacks. Although the attackers can extract the
gate-level netlist by circuit-extraction-based RE, they cannot infer
the obfuscated logic functions. The only way is to exhaustively
test all configurations of OCs by the infeasible brute-force attack.
Fig. 5. Timing overhead on benchmark circuits with different numbers Hence, our proposed obfuscation technique in this brief not only
of OCs.
resists image processing-based RE but also incurs low area and power
overheads. A PUF response can be used to XOR with the configuration
of OCs to generate a device-dependent license to prevent piracy
and overbuilding attacks. The experiment shows that our proposed
obfuscation technique incurs only an average of 0.63% area overhead
and a 2.6% power overhead on ISCAS benchmark circuits, and
especially, there are no performance penalties for it.
R EFERENCES
[1] “Estimating the global economic and social impacts of
counterfeiting and piracy,” Int. Chamber Commerce, Paris, France,
Tech. Rep., 2011. [Online]. Available: http://www.illicittrademonitor.
com/reports/article/estimating-the-global-economic-and-social-impacts-
of-counterfeiting-and-piracy/
[2] Y. Alkabani, F. Koushanfar, and M. Potkonjak, “Remote activation of ICs
for piracy prevention and digital right management,” in Proc. IEEE/ACM
Fig. 6. Power overhead on benchmark circuits with different numbers of OCs. Int. Conf. Comput.-Aided Design, Nov. 2007, pp. 674–677.
[3] J. A. Roy, F. Koushanfar, and I. L. Markov, “EPIC: Ending piracy
of integrated circuits,” in Proc. Design, Autom. Test Eur., 2008,
estimated area, the arrival time for the critical path and the estimated
pp. 1069–1074.
power, respectively, of the design with the original design and [4] R. Torrance and D. James, “The state-of-the-art in semiconductor
obfuscated design as reported by the Synopsys dc. A, D, and P reverse engineering,” in Proc. 48th ACM/EDAC/IEEE Design Autom.
are the percentage area, delay, and power overheads, respectively. Conf. (DAC), Jun. 2011, pp. 333–338.
We can see from Table I that area and power overhead due to [5] L. W. Chow, J. P. Baukus, and W. M. Clark, “Integrated circuits protected
against reverse engineering and method for fabricating the same using
obfuscation are only on average 0.63% and 2.6%, respectively. The an apparent metal contact line terminating on field oxide,” U.S. Patent
delay overhead is 0%, which means that the proposed method in this 7 294 935, Jul. 25, 2002.
brief can obfuscate the design without performance degradation. [6] R. P. Cocchi, J. P. Baukus, B. J. Wang, L. W. Chow, and P.Ouyang,
And finally, we discuss the impact of the numbers of OCs on “Building block for a secure CMOS logic cell library,” U.S. Patent
8 111 089, Feb. 7, 2012.
area, timing, and power overhead for benchmarks. Figs. 4–6 show [7] L.W. Chow, J. P. Baukus, B. J. Wang, and R. P. Cocchi, “Camou-
the impact of various OCs on area, timing, and power overhead flaging a standard cell based integrated circuit,” U.S. Patent 8 151 235,
for benchmarks, respectively. It can be seen that the area is roughly Apr. 3, 2012.
Authorized licensed use limited to: K.L. University(F.K.A. Koneru Lakshmaiah College of Engineering). Downloaded on October 21,2021 at 03:53:07 UTC from IEEE Xplore. Restrictions apply.
IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, VOL. 24, NO. 3, MARCH 2016 1197
[8] J. Zhang, Y. Lin, Y. Lyu, and G. Qu, “A PUF-FSM binding [13] J. Rajendran, M. Sam, O. Sinanoglu, and R. Karri, “Security analysis of
scheme for FPGA IP protection and pay-per-device licensing,” IEEE integrated circuit camouflaging,” in Proc. ACM/SIGSAC Conf. Comput.
Trans. Inf. Forensics Security, vol. 10, no. 6, pp. 1137–1150, Commun. Secur., 2013, pp. 709–720.
Jun. 2015. [14] J.-L. Zhang, G. Qu, Y.-Q. Lyu, and Q. Zhou, “A survey on silicon PUFs
[9] F. Koushanfar and G. Qu, “Hardware metering,” in Proc. 38th Annu. and recent advances in ring oscillator PUFs,” J. Comput. Sci. Technol.,
Design Autom. Conf., 2001, pp. 490–493. vol. 29, no. 4, pp. 664–678, Jul. 2014.
[10] A. Baumgarten, A. Tyagi, and J. Zambreno, “Preventing IC piracy using [15] Degate. [Online]. Available: http://www.degate.org/documentation,
reconfigurable logic barriers,” IEEE Des. Test Comput., vol. 27, no. 1, accessed Jun. 5, 2015.
pp. 66–75, Feb. 2010. [16] Y. Lao and K. K. Parhi, “Obfuscating DSP circuits via high-level
[11] F. Koushanfar, “Provably secure active IC metering techniques for piracy transformations,” IEEE Trans. Very Large Scale Integr. (VLSI) Syst.,
avoidance and digital rights management,” IEEE Trans. Inf. Forensics vol. 23, no. 5, pp. 819–830, May 2015.
Security, vol. 7, no. 1, pp. 51–63, Feb. 2012. [17] R. S. Chakraborty and S. Bhunia, “HARPOON: An obfuscation-
[12] J. Rajendran, Y. Pino, O. Sinanoglu, and R. Karri, “Security analysis based SoC design methodology for hardware protection,” IEEE
of logic obfuscation,” in Proc. 49th ACM/EDAC/IEEE Design Autom. Trans. Comput.-Aided Design Integr. Circuits Syst., vol. 28, no. 10,
Conf., Jun. 2012, pp. 83–89. pp. 1493–1502, Oct. 2009.
Authorized licensed use limited to: K.L. University(F.K.A. Koneru Lakshmaiah College of Engineering). Downloaded on October 21,2021 at 03:53:07 UTC from IEEE Xplore. Restrictions apply.