Abstract
The increasing amount of logic resources in FPGA architectures has enabled the realization of larger and more complex designs. Today, most of the large-scale designs rely heavily on off-the-shelf Intellectual Property Cores (IP Cores) to ease their development. This dependency raises an important issue: the unlicensed use of IP Cores. In this paper, we utilize LUT contents, which represent the functionality of an IP Core, as a signature to determine if a core might be part of an accused design. For this, we present a technique to reconstruct the contained LUT contents from modern FPGA configurations which not only contain 6-input one-output LUTs but also 5-input two-output LUTs. By making use of LUT decomposition together with a fast Boolean matching algorithm, we consolidate the work for commercial architectures. The proposed method is evaluated using 8 IP Cores to find in 4 different designs using two different architectures. Our findings show a \(100\%\) identification rate with no false-positives or false-negatives for all experiments carried out. Especially the presence of larger cores can be established with a difference of at least \(10\%\) between true and false positives.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
An example of such a variation is the change of bus-width or address space of peripheral IP Cores.
- 2.
We denote \(\left| s\right| \) as the amount of elements within a set s.
- 3.
\(\varXi _{t,d}\) is true if the template tof a core is present in the design d.
References
Global semiconductor sales increase 6.5% to \$439 billion in 2020 (2021). https://www.semiconductors.org/global-semiconductor-sales-increase-6-5-to-439-billion-in-2020/
Protecting the FPGA design from common threats. Altera (2009)
Bozzoli, L., Sterpone, L.: Comet: a configuration memory tool to analyze, visualize and manipulate FPGAs bitstream. In: ARCS Workshop 2018; 31th International Conference on Architecture of Computing Systems. VDE (2018)
Brayton, R., et al.: Berkeley logic synthesis and verification group, ABC: a system for sequential synthesis and verification
Chen, M., Liu, P.: A deep learning-based FPGA function block detection method with bitstream to image transformation, vol. 9. IEEE (2021)
Cobham Gaisler AB: GRLIB IP core user manual, 2022.1 (2022)
Courtland, R.: Transistors will stop shrinking in 2021, Moore’s law roadmap - predicts the last itrs report forecasts an end to traditional 2D scaling. IEEE Spectrum (2016)
Dauman, A.: An open IP encryption flow permits industry-wide interoperability. In: White Paper. Synopsys, Inc. (2006)
Ender, M., Moradi, A., Paar, C.: The unpatchable silicon: a full break of the bitstream encryption of xilinx 7-series \(\{\)FPGAs\(\}\). In: 29th USENIX Security Symposium (USENIX Security 20) (2020)
Gupta, R.K., Zorian, Y.: Introducing core-based system design. IEEE Des. Test Comput. 14(4), 15–25 (1997)
Huang, Z., Wang, L., Nasikovskiy, Y., Mishchenko, A.: Fast Boolean matching based on NPN classification. In: 2013 International Conference on Field-Programmable Technology (FPT). IEEE (2013)
Kahng, A.B., et al.: Constraint-based watermarking techniques for design IP protection. vol. 20. IEEE (2001)
Mahmood, S., Rettkowski, J., Shallufa, A., Hübner, M., Göhringer, D.: IP core identification in FPGA configuration files using machine learning techniques. In: 2019 IEEE 9th International Conference on Consumer Electronics (ICCE-Berlin). IEEE (2019)
Moradi, A., Schneider, T.: Improved side-channel analysis attacks on Xilinx bitstream encryption of 5, 6, and 7 series. In: Standaert, F.-X., Oswald, E. (eds.) COSADE 2016. LNCS, vol. 9689, pp. 71–87. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-43283-0_5
Pham, K.D., Horta, E., Koch, D.: BITMAN: a tool and API for FPGA bitstream manipulations. In: Design, Automation & Test in Europe Conference & Exhibition (DATE), 2017. IEEE (2017)
Schmid, M., Ziener, D., Teich, J.: Netlist-level IP protection by watermarking for LUT-based FPGAs. In: 2008 International Conference on Field-Programmable Technology. IEEE (2008)
Tajik, S., Lohrke, H., Seifert, J.P., Boit, C.: On the power of optical contactless probing: attacking bitstream encryption of FPGAs. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security (2017)
Tuzov, I.: Dependability-driven strategies to improve the design and verification of safety-critical HDL-based embedded systems. Ph.D. thesis, Universitat Politècnica de València (2020)
Tuzov, I., de Andrés, D., Ruiz, J.C.: DAVOS: EDA toolkit for dependability assessment, verification, optimisation and selection of hardware models. In: 2018 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN). IEEE (2018)
Wilkinson, K.: Using encryption to secure a 7 series FPGA bitstream, technical report. Technical report, Xilinx (2015)
Xilinx Inc.: 7 Series FPGAs Configurable Logic Block. UG474 (2017)
Xilinx Inc.: Vivado Design Suite TCL Command Reference Guide UG835 (v2019.2) (2019)
Yu, Y., Moraitis, M., Dubrova, E.: Can deep learning break a true random number generator? vol. 68. IEEE (2021)
Zhou, X., Wang, L., Mishchenko, A.: Fast exact NPN classification by co-designing canonical form and its computation algorithm, vol. 69. IEEE (2020)
Ziener, D., Aßmus, S., Teich, J.: Identifying FPGA IP-cores based on lookup table content analysis. In: 2006 International Conference on Field Programmable Logic and Applications. IEEE (2006)
Ziener, D., Teich, J.: Power signature watermarking of IP cores for FPGAs. J. Sig. Process. Syst. 51(1), 123–136 (2008)
Acknowledgements
This work has been funded by Thuringian Ministry for Economics, Science and Digital Society, under grant 2021FGI0008. We are indebted to their support.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Asghar, A., Robillard, A.K., Tuzov, I., Becher, A., Ziener, D. (2022). Using Look Up Table Content as Signatures to Identify IP Cores in Modern FPGAs. In: Schulz, M., Trinitis, C., Papadopoulou, N., Pionteck, T. (eds) Architecture of Computing Systems. ARCS 2022. Lecture Notes in Computer Science, vol 13642. Springer, Cham. https://doi.org/10.1007/978-3-031-21867-5_9
Download citation
DOI: https://doi.org/10.1007/978-3-031-21867-5_9
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-21866-8
Online ISBN: 978-3-031-21867-5
eBook Packages: Computer ScienceComputer Science (R0)