skip to main content
10.1145/2459976.2459985acmotherconferencesArticle/Chapter ViewAbstractPublication PagescsiirwConference Proceedingsconference-collections
research-article

Interlocking obfuscation for anti-tamper hardware

Published:08 January 2013Publication History

ABSTRACT

Tampering and Reverse Engineering of a chip to extract the hardware Intellectual Property (IP) core or to inject malicious alterations is a major concern. Digital systems susceptible to tampering are of immense concern to defense organizations. First, offshore chip manufacturing allows the design secrets of the IP cores to be transparent to the foundry and other entities along the production chain. Second, small malicious modifications to the design may not be detectable after fabrication without anti-tamper mechanisms. Some techniques have been developed in the past to improve the defense against such attacks but they tend to fall prey to the increasing power of the attacker. We present a new way to protect against tampering by a clever obfuscation of the design, which can be unlocked with a specific, dynamic path traversal. Hence, the functional mode of the controller is hidden with the help of obfuscated states, and the functional mode is made operational only on the formation of a specific interlocked Code-Word during state transition. No comparator is needed as the obfuscation is embedded within the transition function of the state machine itself. A side benefit is that any small alteration will be magnified via the obfuscated design. In other words, an alteration to the design will manifest itself as a large difference in the circuit's functionality. Experimental results on an Advanced Encryption Standard (AES) circuit from the open-source IP-cores suite suggest that the proposed method provides better active defense mechanisms against attacks with nominal (7.8%) area overhead.

References

  1. Foreign infringement of intellectuaal property rights implications on selected U.S. industries. http://www.usitc.gov/publications/332/working_papers/id_14_100505.pdf.Google ScholarGoogle Scholar
  2. Open Cores. http://www.opencores.org.Google ScholarGoogle Scholar
  3. Chakraborty, R., and Bhunia, S. Harpoon: An Obfuscation-Based SoC Design Methodology for Hardware Protection. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Chakraborty, R., and Bhunia, S. RTL Hardware IP Protection Using Key-Based Control and Data Flow Obfuscation. In 23rd International Conference on VLSI Design, 2010. VLSID '10., pp. 405--410. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Fan, J., Guo, X., De Mulder, E., Schaumont, P., Preneel, B., and Verbauwhede, I. State-of-the-art of secure ECC implementations: a survey on known side-channel attacks and countermeasures. In IEEE International Symposium on Hardware Oriented Security and Trust (HOST), 2010.Google ScholarGoogle ScholarCross RefCross Ref
  6. Koushanfar, F. Provably Secure Active IC Metering Techniques for Piracy Avoidance and Digital Rights Management. IEEE Transactions on Information Forensics and Security, (feb. 2012). Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Narasimhan, S. and Chakraborty, R. and Bhunia, S. Hardware IP Protection During Evaluation Using Embedded Sequential Trojan. IEEE Design Test of Computers, (2011).Google ScholarGoogle Scholar
  8. Porter, R., Stone, S., Kim, Y., McDonald, J., and Starman, L. Dynamic Polymorphic Reconfiguration for anti-tamper circuits. In International Conference onField Programmable Logic and Applications, 2009. FPL 2009. (2009).Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Interlocking obfuscation for anti-tamper hardware

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Other conferences
          CSIIRW '13: Proceedings of the Eighth Annual Cyber Security and Information Intelligence Research Workshop
          January 2013
          282 pages
          ISBN:9781450316873
          DOI:10.1145/2459976

          Copyright © 2013 Authors

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 8 January 2013

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader