Professional Documents
Culture Documents
Abstract— With the development in IC technology, testing the dollars, consistently. To withs tand these security dangers,
designs is becoming more and more complex. In the design, DFS - Design-for-Security has arisen to be a consolidated
process testing consumes 60-80% of the time. The basic testing
part of IC design [7].
principle is providing the circuit under test (CUT) with input
patterns, observing output responses, and comparing against the Logic encryption is a mainstream countermeasure
desired response called the golden response. As the density of the to confine IP robbery and unlawful overproduction by the
device are rising leads to difficulty in examining the sub-circuit of foundry. Utilizing logic encryption, a designer can present
the chip. S o, testing of design is becoming a time-consuming and some repetitive key-gates into a circuit to disguise its
costly process. Attaching additional logic to the circuit resolves usefulness from an outsider foundry [13]. The right
the issue by testing itself. BIS T is a relatively a design for usefulness of an encrypted IC relies upon the use of the right
testability technique to facilitate thorough testing of ICs and it
comprises the test pattern generator, circuit under test, and keys to the key-gates. The manufactured IC is enacted by
output response analyzer. Quick diagnosis and very high fault applying the mystery keys. These mystery keys are put away
coverage can be ensured by BIS T. As complexity in the circuit is in a carefully designed memory inside the chip [16]. 8
increasing, testing urges TPGs (Test Pattern Generators) to Inaccessibility of the right keys represses an unapproved
generate the test patterns for the CUT to sensitize the faults. client from figuring out the design document and asserting
TPGs are vulnerable to malicious activities such as scan-based the responsibility of the design. Illicitly overproduced ICs
side-channel attacks. S ecret data saved on the chip can be
extracted by an attacker by scanning out the test outcomes. These can't be vended in the market as these don't display the right
threats lead to the emergence of securing TPGs. This work functionality until they are enacted with the specific keys
demonstrates providing a secured test pattern generator for [3]. The goal is to change the behavior of ICs so that they
BIS T circuits by locking the logic of TPG with a password or key will not produce unexpected output unless they are activated
generated by the key generation circuit. Only when the key is correctly using the appropriate keys. Furthermore, an
provided test patterns are generated. This provides versatile unauthorized user must not be ready to easily retrieve the
protection to TPG from malicious attacks such as scan-based
key. Works were done in hardware security to thwart the
side-channel attacks, Intellectual Property (IP) privacy, and IC
overproduction. threats that are
1. Combinational logic obfuscation: conceals the
Keywords— —Hardware security, Logic locking, TPG, functionality by adding additional gates (xor, xnor) called
BIS T, Reverse engineering, Overproduction key gates to the original design [9].
2. IC camouflaging: is a layout technique that disrupts
I. INTRODUCTION attackers from reverse engineering by introducing dummy
contacts or look-alike structure cells used to design logic
542
orized licensed use limited to: AMRITA VISHWA VIDYAPEETHAM AMRITA SCHOOL OF ENGINEERING. Downloaded on December 08,2021 at 10:45:15 UTC from IEEE Xplore. Restrictions a
additional chips for profit. Due to this overproduction, the sim software. This can be considered as case 1.
designer might suffer a loss of revenue and also may have
security implications in the case of some designs. Over the
years, researchers presented various design obfuscation
techniques by altering the functionality to avoid unapproved
overproduction of chips [19].
Mentor Graphics Model Sim Simulator is a source-level
verification tool, which can be used for the simulation of
hardware description languages such as Verilog, System
verilog and VHDL [5]. It can be used to perform simulations
at all different levels including structural, behavioral, and
back annotated[21]. ModelSim is an easy-to-use UI, which
enables users to identify and debug errors. Once an error is
detected, it enables the user to edit, compile and re-stimulate
again using the simulator. It also supports Micro semi-FPGA
libraries [20].
543
orized licensed use limited to: AMRITA VISHWA VIDYAPEETHAM AMRITA SCHOOL OF ENGINEERING. Downloaded on December 08,2021 at 10:45:15 UTC from IEEE Xplore. Restrictions a
No of bits Static Power(mw) Dynamic
Power(mw)
IV. RESULTS AND DISCUSSIONS
4 0.09 0.4036
5 0.09 0.4071
6 0.09 0.4113
From table 1 and 2 it is concluded that the provided 7 0.09 0.4214
security is efficient without any area overhead. Number of flip
8 0.09 0.4139
flops required for each DUS is equal to sum of number flip
flops used in key generation circuit and used to implement the
Table 3: Power report of LFS R
TPG. As per table analysis the number of flip flops in DUS
satisfied with above equation of flip flops resulting in
conclusion of area issue. Number of Static Power (mw) Dynamic
bits Power (mw)
4 0.09 0.3997
Performance 4 bit 5 bit 6 bit 7 bit 8 bit 5 0.09 0.4012
no of states 15 31 63 127 255 6 0.09 0.4057
generated
7 0.09 0.4068
Number of 3 3 3 3 3
Key Bits 8 0.09 0.4094
Time to 150ns- 310ns- 630ns- 1270ns- 2550ns- Table 4:Power report of Counter
Complete all 300ns 620ns 1260 2540ns 5100ns
states ns
Table 3 and 4 provides static and dynamic power
Clock period 10ns 10ns 10ns 10ns 10ns values that are used to analyze power utilized by the circuit
Key_clk 150ns 310ns 630ns 1270ns 2550 ns during standby mode and working mode. Constrains in the
period dynamic power report are signals consuming power, logic
Flip Flops 7 8 9 10 11 power and I/O power. From the tables it can analyze that
XOR Gates 1 1 1 1 3 static power is less than dynamic power concludes leakage
LUT 4 4 5 5 7 of power is negligible in the proposed security of TPG. As
IO 10 11 12 13 14 due to the variation in the number of bits of implemented
TPGs, interconnects increase leading to increase in power
Table 1: S imulation and synthesis entries of LFS Rs consumption by I/O. In case of LFSRs there are increment
and decrement of logic components such as XOR gates
based on the length of input of LFSR, this results in the
irregularity in dynamic power values of LFSR TPG.
Performance 4 bit 5 bit 6 bit 7 bit 8 bit Considering counters there is regularity in logic components
no of states 16 32 64 128 256 variation resulting in regularity of dynamic power values.
generated
Number of 3 3 3 3 3
Key Bits
Time to No of bits WNS WHS
160ns- 320ns- 640ns- 1280ns- 2560ns-
Complete all 320ns 640ns 1280ns 2560ns 5120ns 4 6.682 0.21
states 5 6.636 0.214
Clock period 10ns 10ns 10ns 10ns 10ns 6 6.794 0.13
Key_clk 160ns 320ns 640ns 1280ns 2560ns 7 6.429 0.213
period 8 6.434 0.179
Flip Flops 7 8 9 10 11
XOR Gates 6 6 8 8 10 Table 5: Timing report of LFS R
LUT 10 11 12 13 14
IO 4 bit 5 bit 6 bit 7 bit 8 bit No of bits WNS WHS
4 7.555 0.137
Table 2: S imulation and synthesis entries of COUNTER’s 5 7.114 0.158
6 7.186 0.15
7 6.549 0.153
8 6.335 0.135
544
orized licensed use limited to: AMRITA VISHWA VIDYAPEETHAM AMRITA SCHOOL OF ENGINEERING. Downloaded on December 08,2021 at 10:45:15 UTC from IEEE Xplore. Restrictions a
Fig 2: RTL schematics of 8 bit LFS R
After run implementation, timing constraints reports Irrespective of adding extra design for key generation the
gives a detailed analysis of design. This timing analysis static power is less than dynamic power in turn avoiding
leakage during standby mode. As the key length increases
includes verifying that all paths in design met timing bruce force attack for finding correct key will be difficult and
requirements, analyzing setup and hold constraints, verifying would take years. The proposed strategy has also met timing
if operational frequency is within the performance limit, path with concluding in it.
verifying whether any critical path left unconstrained or not. Future work will be focused on designing the proposed
WNS is Worst Negative referring to setup time and WHS is work in mentor grphics HDL Designer. More number of Test
Patterns Generators would be taken and these TPG’s would be
Worst Hold Slack referring to hold time where Slack = Data provided with security and analysis would be d one with
Required Time - Data Arrival Time. From tabular values of optimizing area and power consumption.
LFSRs and counters it can be seen that WNS and WHS are
positive which means that slack is positive that is data VI. REFERENCES
arrival time is greater than data required time leading to
delay less circuit. So designed DUS is performing without [1] P. S. Dilip, G. R. Somanathan, and R. Bhakthavatchalu, “Reseeding LFSR
any delay resulting in the secured TPGs without overheads. for test pattern generation,” in Proceedings [5] of the 2019 IEEE International
Securing TPGs met the timing paths of the circuit. Conference on Communication and Signal Processing, ICCSP 2019, 2019, pp.
921–925.
[2] T sai, F. Liu and J. Feng, "A Dominant Gate Insertion Algorithm
V. CONCLUSION AND FUTURE WORK Implementation for Logic Locking in IP Protection," 2019 IEEE International
Conference on Electron Devices and Solid-State Circuits Circuits (EDSSC),
Xi'an, China, 2019, pp. 1-3, doi: 10.1109/EDSSC.2019.8754092.
In this paper, we have proposed a security methodology which
secures test pattern generators(TPGS) from hardware threats. [3] Essentials of Electronic Testing for Digital, Memory and Mixed-Signal
VLSI Circuits.
545
orized licensed use limited to: AMRITA VISHWA VIDYAPEETHAM AMRITA SCHOOL OF ENGINEERING. Downloaded on December 08,2021 at 10:45:15 UTC from IEEE Xplore. Restrictions a
[4] A.Mehta, D. Saif and R. Rashidzadeh, "A hardware security solution 2019 9th International Symposium on Embedded Computing and System
against scanbased attacks," 2016 IEEE International Symposium on [8] Design (ISED), Kollam, India, 2019, pp. 1-4, doi:
Circuits and Systems (ISCAS), Montreal, QC, 2016, pp. 1698 -1701, doi: 10.1109/ISED48680.2019.9096234.
10.1109/ISCAS.2016.7538894.
[5] T .T hangam, G. Gayat hri and T . Madhubala, "A novel logic locking
technique for hardware security," 2017 IEEE International Conference [3] on
Electrical, Instrumentation and Communication Engineering (ICEICE), Karur,
2017, pp. 1-7, doi: 10.1109/ICEICE.2017.8192439.
[6] R.U. Rani, D. Jayanthi, N. A. Vignesh and K. Kavitha, "Key-Based
Functional Obfuscation of Integrated Circuits for a Hardware Security," 2019
2nd International Conference on Intelligent Computing, Instrumentation and
Control Technologies (ICICICT), Kannur,Kerala, India, 2019, pp. 733-737,
doi: 10.1109/ICICICT 46008.2019.8993122. 23
[7] Y. Liu, M. Zuzak, Y. Xie, A. Chakraborty and A. Srivastava, "Strong
Anti-SAT : Secure and Effective Logic Locking," 2020 21st International
Symposium on Quality Electronic Design (ISQED), Santa Clara, CA, USA,
2020, pp. 199-205, doi: 10.1109/ISQED48828.2020.9136983.
[8] R. Karmakar, N. Prasad, S. Chattopadhyay, R. Kapur, and I. Sengupta, “A
new logic encryption strategy ensuring key interdependency,” in VLSID.
IEEE, 2017, pp. 429–434.
[9] “ Trends in the global ic design service market,” DIGIT IMES Research.
[Online]. Available: http://www.digitimes.com/news/a20120313RS400.
html?chid=2
[10] M. Rostami, F. Koushanfar, and R. Karri, “A primer on hardware
security: Models, methods, and metrics,” Proceedings of the IEEE, vol. 102,
no. 8, pp. 1283– 1295, 2014.
[11] J. A. Roy, F. Koushanfar, and I. L. Markov, “Epic: Ending piracy of
integrated circuits,” in DAT E, 2008, pp. 1069–1074.
[12] “ Innovation is at risk: Losses of up to $4 billion annually due t o ip
infringement,” SEMI. [Online]. Available: http://semi.org/en/ innovation-risk-
losses4-billion-annually-due-ip-infringement
[13] R. S. Chakraborty and S. Bhunia, “Harpoon: an obfuscation -based soc
design methodology for hardware protect ion,” IEEE T ran. on CAD of
Integrated Circuits and Systems, vol. 28, no. 10, pp. 1493–1502, 2009.
[14] J. Zhang, "A Practical Logic Obfuscation T echnique for Hardware
Security," in IEEE T ransactions on Very Large Scale Integration (VLSI)
Systems, vol. 24, no. 3, pp. 1193-1197, March 2016, doi:
10.1109/T VLSI.2015.2437996.
[15] M. Doulcier, M. -. Flottes and B. Rouzeyre, "AES-Based BIST : Self-
T est, Test Pattern Generation and Signature Analysis," 4th IEEE International
Symposium on Electronic Design, T est and Applications (delta 2008), Hong
Kong, 2008, pp. 314- 321, doi: 10.1109/DELT A.2008.86.
[16] Y. Jin, "Design-for-Security vs. Design-for-Testability: A Case Study on
DFT Chain in Cryptographic Circuits," 2014 IEEE Computer Society Annual
Symposium on VLSI, T ampa, FL, 2014, pp. 19-24, doi:
10.1109/ISVLSI.2014.54.
[17] E. T an, W. Qian and Y. Li, "An improved pattern generation for Built -in
Selftest design based on boundary-scan reseeding," 2009 International
Conference on Communications, Circuits and Systems, Milpitas, CA, 2009,
pp. 1082-1086, doi: 10.1109/ICCCAS.2009.5250336.
[18] J. Rajendran, Y. Pino, O. Sinanoglu and R. Karri, "Security analysis of
logic obfuscation," DAC Design Automation Conference 2012, San
Francisco, CA, 2012, pp. 83-89, doi: 10.1145/2228360.2228377.
[19] Y. Liu, M. Zuzak, Y. Xie, A. Chakraborty and A. Srivastava, "St rong
Anti-SAT : Secure and Effective Logic Locking," 2020 21st International
Symposium on Quality Electronic Design (ISQED), Santa Clara, CA, USA,
2020, pp. 199-205, doi: 10.1109/ISQED48828.2020.9136983.
[20]. S. S. S. G. Seeram, S. N. N. Polireddi, G. R. Somanathan and R.
Bhakthavatchalu, "Synthesis of Synchronous Gray Code Counters by
Combining Mentor Graphics HDL Designer and Xilinx VIVADO FPGA
Flow," 2020 International Conference on Communication and Signal
Processing (ICCSP), Chennai, India, 2020, pp. 738-742, doi:
10.1109/ICCSP48568.2020.9182333
[21]. B. N. Sumanth, B. L. Reddy, G. R. Somanathan and Ramesh, "A
Proposal for Synthesis of Synchronous Counters," 2020 4th International
Conference on Trends in Electronics and Informatics (ICOEI)(48184),
T irunelveli, India, 2020, pp. 80-84, doi: 10.1109/ICOEI48184.2020.9142898.
[22] P. S. Dilip, G. R. Somanathan and R. Bhakthavatchalu, "Comparat ive
Study of T est Pattern Generation Systems to Reduce T est Application T ime,"
546
orized licensed use limited to: AMRITA VISHWA VIDYAPEETHAM AMRITA SCHOOL OF ENGINEERING. Downloaded on December 08,2021 at 10:45:15 UTC from IEEE Xplore. Restrictions a