Skip to main content

Hardware IP Protection Using Register Transfer Level Locking and Obfuscation of Control and Data Flow

  • Chapter
  • First Online:
Behavioral Synthesis for Hardware Security

Abstract

With the new advancement of Industry 4.0, there is raising concern over hardware intellectual property (IP) piracy and reverse engineering to an IP-based system-on-chip (SoC) design flow. In this chapter, we provide details on a register transfer level (RTL) hardware IP protection technique based on low-overhead key-based obfuscation of control and data flow. This technique achieves protection by transforming the RTL code to control data flow graph (CDFG). The transformed CDFG is integrated with a well-obfuscated finite state machine (FSM) of special structure, referred as “Mode-Control FSM” in a way that only a specific key sequence enables the normal functional behaviour. The chapter also discusses a basic metric to quantify the quality of obfuscation and provide theoretical analysis of the technique. We also discuss the integrated design flow along with simulation results of two open-source IP cores and low hardware footprint achieved by the technique. The chapter also provides a brief idea about the recent works on RTL-based hardware IP protection and future directions of research.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 79.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 99.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 139.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Batra, T.: Methodology for protection and licensing of HDL IP. http://www.us.design-reuse.com/news/?id=12745&print=yes (2020)

    Google Scholar 

  2. Castillo, E., Meyer-Baese, U., Garcia, A., Parrilla, L., Lloris, A.: IPP@HDL: Efficient intellectual property protection scheme for ip cores. IEEE Trans. Very Large Scale Integr. Syst. 15(5), 578–591 (2007)

    Article  Google Scholar 

  3. Chakraborty, R.S., Bhunia, S.: Hardware protection and authentication through netlist level obfuscation. In: 2008 IEEE/ACM International Conference on Computer-Aided Design, pp. 674–677 (2008)

    Google Scholar 

  4. Chakraborty, R.S., Bhunia, S.: RTL hardware IP protection using key-based control and data flow obfuscation. In: 2010 23rd International Conference on VLSI Design, pp. 405–410 (2010)

    Google Scholar 

  5. Collberg, C., Thomborson, C., Low, D.: Manufacturing cheap, resilient, and stealthy opaque constructs. In: Proceedings of the 25th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL ’98, p. 184–96. Association for Computing Machinery, New York (1998). 10.1145/268946.268962

  6. Desai, A.R., Hsiao, M.S., Wang, C., Nazhandali, L., Hall, S.: Interlocking obfuscation for anti-tamper hardware. In: Proceedings of the Eighth Annual Cyber Security and Information Intelligence Research Workshop, CSIIRW ’13, pp. 1–4. Association for Computing Machinery, New York (2013). 10.1145/2459976.2459985

  7. Fyrbiak, M., Wallat, S., Déchelotte, J., Albartus, N., Böcker, S., Tessier, R., Paar, C.: On the difficulty of FSM-based hardware obfuscation. IACR Trans. Cryptograph. Hardware Embed. Syst. 2018(3), 293–330 (2018)

    Article  Google Scholar 

  8. Goering, R.: Synplicity Initiative Eases IP evaluation for FPGAs. http://www.scdsource.com/article.php?id=170 (2020)

  9. Millican, S., Ramanathan, P., Saluja, K.: CryptIP: An approach for encrypting intellectual property cores with simulation capabilities. In: 2014 27th International Conference on VLSI Design and 2014 13th International Conference on Embedded Systems, pp. 92–97 (2014)

    Google Scholar 

  10. OpenCores. http://www.opencores.org (2020)

  11. Ramanathan, P., Saluja, K.K.: Crypt-delay: Encrypting IP cores with capabilities for gate-level logic and delay simulations. In: 2016 IEEE 25th Asian Test Symposium (ATS), pp. 7–12 (2016)

    Google Scholar 

  12. Shakya, B., Tehranipoor, M.M., Bhunia, S., Forte, D.: Introduction to hardware obfuscation: Motivation, methods and evaluation. In: Forte D., Bhunia S., Tehranipoor M.M. (eds.) Hardware Protection through Obfuscation, pp. 3–32. Springer International Publishing, Cham (2017)

    Chapter  Google Scholar 

  13. Zhuang, X., Zhang, T., Lee, H.H.S., Pande, S.: Hardware assisted control flow obfuscation for embedded processors. In: Proceedings of the 2004 International Conference on Compilers, Architecture, and Synthesis for Embedded Systems, CASES ’04, pp. 292–302. Association for Computing Machinery, New York (2004). 10.1145/1023833.1023873

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rajat Subhra Chakraborty .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Santikellur, P., Chakraborty, R.S., Bhunia, S. (2022). Hardware IP Protection Using Register Transfer Level Locking and Obfuscation of Control and Data Flow. In: Katkoori, S., Islam, S.A. (eds) Behavioral Synthesis for Hardware Security. Springer, Cham. https://doi.org/10.1007/978-3-030-78841-4_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-78841-4_4

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-78840-7

  • Online ISBN: 978-3-030-78841-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics