Hardware obfuscation using PUF-based logic

There is a great need to develop universal and robust techniques for intellectual property protection of integrated circuits. In this paper, we introduce techniques for the obfuscation of an arbitrary circuit by using physical unclonable functions (PUFs) and programmable logic. Specifically, we introduce the notion of PUF-based logic which can be configured to be functionally equivalent to any arbitrary design, as well as a new architecture for wire merging that obfuscates signal paths exponentially. We systematically apply our techniques in such a way so as to maximize obfuscation while minimizing area and delay overhead. We analyze our techniques on popular benchmark circuits and show them to be resilient against very powerful reverse engineering attacks in which the adversary has knowledge of the complete netlist along with the ability to read and write to any flip-flop in the circuit.

[1]  Dick James,et al.  The state-of-the-art in semiconductor reverse engineering , 2011, 2011 48th ACM/EDAC/IEEE Design Automation Conference (DAC).

[2]  Miodrag Potkonjak,et al.  Secure remote sensing and communication using digital PUFs , 2014, 2014 ACM/IEEE Symposium on Architectures for Networking and Communications Systems (ANCS).

[3]  Jeyavijayan Rajendran,et al.  Security analysis of logic obfuscation , 2012, DAC Design Automation Conference 2012.

[4]  Miodrag Potkonjak,et al.  The bidirectional polyomino partitioned PPUF as a hardware security primitive , 2013, 2013 IEEE Global Conference on Signal and Information Processing.

[5]  Srinivas Devadas,et al.  Silicon physical random functions , 2002, CCS '02.

[6]  David Bryan,et al.  Combinational profiles of sequential benchmark circuits , 1989, IEEE International Symposium on Circuits and Systems,.

[7]  Miodrag Potkonjak,et al.  Watermarking techniques for intellectual property protection , 1998, Proceedings 1998 Design and Automation Conference. 35th DAC. (Cat. No.98CH36175).

[8]  Miodrag Potkonjak,et al.  Nanotechnology-based trusted remote sensing , 2011, 2011 IEEE SENSORS Proceedings.

[9]  Beatrice Fraboni,et al.  Layout reconstruction of complex silicon chips , 1993 .

[10]  Dick James,et al.  The State-of-the-Art in IC Reverse Engineering , 2009, CHES.

[11]  Miodrag Potkonjak,et al.  Matched Digital PUFs for Low Power Security in Implantable Medical Devices , 2014, 2014 IEEE International Conference on Healthcare Informatics.

[12]  Miodrag Potkonjak,et al.  Remote activation of ICs for piracy prevention and digital right management , 2007, 2007 IEEE/ACM International Conference on Computer-Aided Design.

[13]  Giovanni Squillero,et al.  RT-Level ITC'99 Benchmarks and First ATPG Results , 2000, IEEE Des. Test Comput..

[14]  Miodrag Potkonjak,et al.  Digital bimodal function: An ultra-low energy security primitive , 2013, International Symposium on Low Power Electronics and Design (ISLPED).

[15]  Joseph Zambreno,et al.  Preventing IC Piracy Using Reconfigurable Logic Barriers , 2010, IEEE Design & Test of Computers.

[16]  Koji Nakamae,et al.  Automatic recognition of defect areas on a semiconductor wafer using multiple scanning electron microscope images , 2009 .

[17]  Miodrag Potkonjak,et al.  A secure and unclonable embedded system using instruction-level PUF authentication , 2014, 2014 24th International Conference on Field Programmable Logic and Applications (FPL).

[18]  David Evans,et al.  Reverse-Engineering a Cryptographic RFID Tag , 2008, USENIX Security Symposium.

[19]  F. Brglez,et al.  A neutral netlist of 10 combinational benchmark circuits and a target translator in FORTRAN , 1985 .

[20]  Jeyavijayan Rajendran,et al.  Security analysis of integrated circuit camouflaging , 2013, CCS.

[21]  Jean-Pierre Seifert,et al.  Breaking and entering through the silicon , 2013, CCS.

[22]  Miodrag Potkonjak,et al.  Public Physical Unclonable Functions , 2014, Proceedings of the IEEE.

[23]  Boris Skoric,et al.  Anti-counterfeiting, key distribution, and key storage in an ambient world via physical unclonable functions , 2009, Inf. Syst. Frontiers.

[24]  Ashish Tiwari,et al.  WordRev: Finding word-level structures in a sea of bit-level gates , 2013, 2013 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST).

[25]  Sharad Malik,et al.  Reverse engineering digital circuits using functional analysis , 2013, 2013 Design, Automation & Test in Europe Conference & Exhibition (DATE).

[26]  Erich Barke,et al.  A Technology Independent Block Extraction Algorithm , 1984, 21st Design Automation Conference Proceedings.

[27]  Srinivas Devadas,et al.  Security Based on Physical Unclonability and Disorder , 2012 .

[28]  Miodrag Potkonjak,et al.  Robust and flexible FPGA-based digital PUF , 2014, 2014 24th International Conference on Field Programmable Logic and Applications (FPL).

[29]  Jean-Pierre Seifert,et al.  Functional integrated circuit analysis , 2012, 2012 IEEE International Symposium on Hardware-Oriented Security and Trust.

[30]  G. Edward Suh,et al.  Physical Unclonable Functions for Device Authentication and Secret Key Generation , 2007, 2007 44th ACM/IEEE Design Automation Conference.