Abstract
With the new advancement of Industry 4.0, there is raising concern over hardware intellectual property (IP) piracy and reverse engineering to an IP-based system-on-chip (SoC) design flow. In this chapter, we provide details on a register transfer level (RTL) hardware IP protection technique based on low-overhead key-based obfuscation of control and data flow. This technique achieves protection by transforming the RTL code to control data flow graph (CDFG). The transformed CDFG is integrated with a well-obfuscated finite state machine (FSM) of special structure, referred as “Mode-Control FSM” in a way that only a specific key sequence enables the normal functional behaviour. The chapter also discusses a basic metric to quantify the quality of obfuscation and provide theoretical analysis of the technique. We also discuss the integrated design flow along with simulation results of two open-source IP cores and low hardware footprint achieved by the technique. The chapter also provides a brief idea about the recent works on RTL-based hardware IP protection and future directions of research.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Batra, T.: Methodology for protection and licensing of HDL IP. http://www.us.design-reuse.com/news/?id=12745&print=yes (2020)
Castillo, E., Meyer-Baese, U., Garcia, A., Parrilla, L., Lloris, A.: IPP@HDL: Efficient intellectual property protection scheme for ip cores. IEEE Trans. Very Large Scale Integr. Syst. 15(5), 578–591 (2007)
Chakraborty, R.S., Bhunia, S.: Hardware protection and authentication through netlist level obfuscation. In: 2008 IEEE/ACM International Conference on Computer-Aided Design, pp. 674–677 (2008)
Chakraborty, R.S., Bhunia, S.: RTL hardware IP protection using key-based control and data flow obfuscation. In: 2010 23rd International Conference on VLSI Design, pp. 405–410 (2010)
Collberg, C., Thomborson, C., Low, D.: Manufacturing cheap, resilient, and stealthy opaque constructs. In: Proceedings of the 25th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL ’98, p. 184–96. Association for Computing Machinery, New York (1998). 10.1145/268946.268962
Desai, A.R., Hsiao, M.S., Wang, C., Nazhandali, L., Hall, S.: Interlocking obfuscation for anti-tamper hardware. In: Proceedings of the Eighth Annual Cyber Security and Information Intelligence Research Workshop, CSIIRW ’13, pp. 1–4. Association for Computing Machinery, New York (2013). 10.1145/2459976.2459985
Fyrbiak, M., Wallat, S., Déchelotte, J., Albartus, N., Böcker, S., Tessier, R., Paar, C.: On the difficulty of FSM-based hardware obfuscation. IACR Trans. Cryptograph. Hardware Embed. Syst. 2018(3), 293–330 (2018)
Goering, R.: Synplicity Initiative Eases IP evaluation for FPGAs. http://www.scdsource.com/article.php?id=170 (2020)
Millican, S., Ramanathan, P., Saluja, K.: CryptIP: An approach for encrypting intellectual property cores with simulation capabilities. In: 2014 27th International Conference on VLSI Design and 2014 13th International Conference on Embedded Systems, pp. 92–97 (2014)
OpenCores. http://www.opencores.org (2020)
Ramanathan, P., Saluja, K.K.: Crypt-delay: Encrypting IP cores with capabilities for gate-level logic and delay simulations. In: 2016 IEEE 25th Asian Test Symposium (ATS), pp. 7–12 (2016)
Shakya, B., Tehranipoor, M.M., Bhunia, S., Forte, D.: Introduction to hardware obfuscation: Motivation, methods and evaluation. In: Forte D., Bhunia S., Tehranipoor M.M. (eds.) Hardware Protection through Obfuscation, pp. 3–32. Springer International Publishing, Cham (2017)
Zhuang, X., Zhang, T., Lee, H.H.S., Pande, S.: Hardware assisted control flow obfuscation for embedded processors. In: Proceedings of the 2004 International Conference on Compilers, Architecture, and Synthesis for Embedded Systems, CASES ’04, pp. 292–302. Association for Computing Machinery, New York (2004). 10.1145/1023833.1023873
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Santikellur, P., Chakraborty, R.S., Bhunia, S. (2022). Hardware IP Protection Using Register Transfer Level Locking and Obfuscation of Control and Data Flow. In: Katkoori, S., Islam, S.A. (eds) Behavioral Synthesis for Hardware Security. Springer, Cham. https://doi.org/10.1007/978-3-030-78841-4_4
Download citation
DOI: https://doi.org/10.1007/978-3-030-78841-4_4
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-78840-7
Online ISBN: 978-3-030-78841-4
eBook Packages: Computer ScienceComputer Science (R0)