Skip to main content

Using Look Up Table Content as Signatures to Identify IP Cores in Modern FPGAs

  • Conference paper
  • First Online:
Architecture of Computing Systems (ARCS 2022)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 13642))

Included in the following conference series:

  • 504 Accesses

Abstract

The increasing amount of logic resources in FPGA architectures has enabled the realization of larger and more complex designs. Today, most of the large-scale designs rely heavily on off-the-shelf Intellectual Property Cores (IP Cores) to ease their development. This dependency raises an important issue: the unlicensed use of IP Cores. In this paper, we utilize LUT contents, which represent the functionality of an IP Core, as a signature to determine if a core might be part of an accused design. For this, we present a technique to reconstruct the contained LUT contents from modern FPGA configurations which not only contain 6-input one-output LUTs but also 5-input two-output LUTs. By making use of LUT decomposition together with a fast Boolean matching algorithm, we consolidate the work for commercial architectures. The proposed method is evaluated using 8 IP Cores to find in 4 different designs using two different architectures. Our findings show a \(100\%\) identification rate with no false-positives or false-negatives for all experiments carried out. Especially the presence of larger cores can be established with a difference of at least \(10\%\) between true and false positives.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 54.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 69.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    An example of such a variation is the change of bus-width or address space of peripheral IP Cores.

  2. 2.

    We denote \(\left| s\right| \) as the amount of elements within a set s.

  3. 3.

    \(\varXi _{t,d}\) is true if the template tof a core is present in the design d.

References

  1. Global semiconductor sales increase 6.5% to \$439 billion in 2020 (2021). https://www.semiconductors.org/global-semiconductor-sales-increase-6-5-to-439-billion-in-2020/

  2. Protecting the FPGA design from common threats. Altera (2009)

    Google Scholar 

  3. Bozzoli, L., Sterpone, L.: Comet: a configuration memory tool to analyze, visualize and manipulate FPGAs bitstream. In: ARCS Workshop 2018; 31th International Conference on Architecture of Computing Systems. VDE (2018)

    Google Scholar 

  4. Brayton, R., et al.: Berkeley logic synthesis and verification group, ABC: a system for sequential synthesis and verification

    Google Scholar 

  5. Chen, M., Liu, P.: A deep learning-based FPGA function block detection method with bitstream to image transformation, vol. 9. IEEE (2021)

    Google Scholar 

  6. Cobham Gaisler AB: GRLIB IP core user manual, 2022.1 (2022)

    Google Scholar 

  7. Courtland, R.: Transistors will stop shrinking in 2021, Moore’s law roadmap - predicts the last itrs report forecasts an end to traditional 2D scaling. IEEE Spectrum (2016)

    Google Scholar 

  8. Dauman, A.: An open IP encryption flow permits industry-wide interoperability. In: White Paper. Synopsys, Inc. (2006)

    Google Scholar 

  9. Ender, M., Moradi, A., Paar, C.: The unpatchable silicon: a full break of the bitstream encryption of xilinx 7-series \(\{\)FPGAs\(\}\). In: 29th USENIX Security Symposium (USENIX Security 20) (2020)

    Google Scholar 

  10. Gupta, R.K., Zorian, Y.: Introducing core-based system design. IEEE Des. Test Comput. 14(4), 15–25 (1997)

    Article  Google Scholar 

  11. Huang, Z., Wang, L., Nasikovskiy, Y., Mishchenko, A.: Fast Boolean matching based on NPN classification. In: 2013 International Conference on Field-Programmable Technology (FPT). IEEE (2013)

    Google Scholar 

  12. Kahng, A.B., et al.: Constraint-based watermarking techniques for design IP protection. vol. 20. IEEE (2001)

    Google Scholar 

  13. Mahmood, S., Rettkowski, J., Shallufa, A., Hübner, M., Göhringer, D.: IP core identification in FPGA configuration files using machine learning techniques. In: 2019 IEEE 9th International Conference on Consumer Electronics (ICCE-Berlin). IEEE (2019)

    Google Scholar 

  14. Moradi, A., Schneider, T.: Improved side-channel analysis attacks on Xilinx bitstream encryption of 5, 6, and 7 series. In: Standaert, F.-X., Oswald, E. (eds.) COSADE 2016. LNCS, vol. 9689, pp. 71–87. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-43283-0_5

    Chapter  MATH  Google Scholar 

  15. Pham, K.D., Horta, E., Koch, D.: BITMAN: a tool and API for FPGA bitstream manipulations. In: Design, Automation & Test in Europe Conference & Exhibition (DATE), 2017. IEEE (2017)

    Google Scholar 

  16. Schmid, M., Ziener, D., Teich, J.: Netlist-level IP protection by watermarking for LUT-based FPGAs. In: 2008 International Conference on Field-Programmable Technology. IEEE (2008)

    Google Scholar 

  17. Tajik, S., Lohrke, H., Seifert, J.P., Boit, C.: On the power of optical contactless probing: attacking bitstream encryption of FPGAs. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security (2017)

    Google Scholar 

  18. Tuzov, I.: Dependability-driven strategies to improve the design and verification of safety-critical HDL-based embedded systems. Ph.D. thesis, Universitat Politècnica de València (2020)

    Google Scholar 

  19. Tuzov, I., de Andrés, D., Ruiz, J.C.: DAVOS: EDA toolkit for dependability assessment, verification, optimisation and selection of hardware models. In: 2018 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN). IEEE (2018)

    Google Scholar 

  20. Wilkinson, K.: Using encryption to secure a 7 series FPGA bitstream, technical report. Technical report, Xilinx (2015)

    Google Scholar 

  21. Xilinx Inc.: 7 Series FPGAs Configurable Logic Block. UG474 (2017)

    Google Scholar 

  22. Xilinx Inc.: Vivado Design Suite TCL Command Reference Guide UG835 (v2019.2) (2019)

    Google Scholar 

  23. Yu, Y., Moraitis, M., Dubrova, E.: Can deep learning break a true random number generator? vol. 68. IEEE (2021)

    Google Scholar 

  24. Zhou, X., Wang, L., Mishchenko, A.: Fast exact NPN classification by co-designing canonical form and its computation algorithm, vol. 69. IEEE (2020)

    Google Scholar 

  25. Ziener, D., Aßmus, S., Teich, J.: Identifying FPGA IP-cores based on lookup table content analysis. In: 2006 International Conference on Field Programmable Logic and Applications. IEEE (2006)

    Google Scholar 

  26. Ziener, D., Teich, J.: Power signature watermarking of IP cores for FPGAs. J. Sig. Process. Syst. 51(1), 123–136 (2008)

    Article  Google Scholar 

Download references

Acknowledgements

This work has been funded by Thuringian Ministry for Economics, Science and Digital Society, under grant 2021FGI0008. We are indebted to their support.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ali Asghar .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Asghar, A., Robillard, A.K., Tuzov, I., Becher, A., Ziener, D. (2022). Using Look Up Table Content as Signatures to Identify IP Cores in Modern FPGAs. In: Schulz, M., Trinitis, C., Papadopoulou, N., Pionteck, T. (eds) Architecture of Computing Systems. ARCS 2022. Lecture Notes in Computer Science, vol 13642. Springer, Cham. https://doi.org/10.1007/978-3-031-21867-5_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-21867-5_9

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-21866-8

  • Online ISBN: 978-3-031-21867-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics