skip to main content
research-article

Trust-Based Design and Check of FPGA Circuits Using Two-Level Randomized ECC Structures

Published:01 March 2009Publication History
Skip Abstract Section

Abstract

A novel trust-based design method for FPGA circuits that uses error-correcting code (ECC) structures for detecting design tampers (changes, deletion of existing logic, and addition of extradesign logic-like Trojans) is proposed in this article. We determine ECC-based CLB (configuration logic block) parity groups and embed the check CLBs for each parity group in the FPGA circuit. During a trust-checking phase, a Test-Pattern Generator (TPG) and an Output Response Analyzer (ORA), configured in the FPGA, are used to check that each parity group of CLB outputs produce the expected parities. We use two levels of randomization to thwart attempts by an adversary to discover the parity groups and inject tampers that mask each other, or to tamper with the TPG and ORA so that design tampers remain undetected: (a) randomization of the mapping of the ECC parity groups to the CLB array; (b) randomization within each parity group of odd and even parities for different input combinations (classically, all ECC parity groups have even parities across all inputs). These randomizations along with the error-detecting property of the underlying ECC lead to design tampers being uncovered with very high probabilities, as we show both analytically and empirically. We also classify different CLB function structures and impose a parity group selection in which only similarly structured functions are randomly selected to be in the same parity group in order to minimize check function complexity. Using the 2D code as our underlying ECC and its 2-level randomization, our experiments with inserting 1-10 circuit CLB tampers and 1-5 extraneous logic CLBs in two medium-size circuits and a RISC processor circuit implemented on a Xilinx Spartan-3 FPGA show promising results of 100% tamper detection and 0% false alarms, obtained at a hardware overhead of only 7-10%.

References

  1. Adell, P. and Allen, G. 2008. Assessing and mitigating radiation effects in Xilinx FPGAs. JPL Publication 08-9, Jet Propulsim Laboratory, California Institute of Technology.Google ScholarGoogle Scholar
  2. Bolchini, C., Quarta, D., and Santambrogio, M. D. 2007. SEU mitigation for SRAM-based FPGAs through dynamic partial reconfiguration. In Proceedings of the 17th ACM Symposium on VLSI. 55--60. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Carmichael, C., Caffrey, M., and Salazar, A. 2000. Correcting single event upsets through virtex partial configuration. Xilinx Application Note XAPP 216. http://www.xilinx.com/support/documentation/application_notes/xapp216.pdf.Google ScholarGoogle Scholar
  4. Clayton, J. 2002. http://www.opencores.org/projects.cgi/web/risc16f84/overview.Google ScholarGoogle Scholar
  5. DARPA. DARPA: TRUST in Integrated Circuits (TRUST) webpage: http://www.darpa.mil/mto/programs/trust/index.html.Google ScholarGoogle Scholar
  6. Dipert, B. 2000. Cunning circuits confound crooks. http://www.e-insite.net/ednmag/contents/images/21df2.pdf.Google ScholarGoogle Scholar
  7. Dutt, S. and Mahapatra, N. R. 1997. Node-covering, error-correcting codes and multiprocessors with very high average fault tolerance. IEEE Trans. Comput. 46, 9, 997--1015. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Dyer, J., Lindemann, M., Perez, R., Sailer, R., Smith, S. W., van Doorn, L., and Weingart, S. 2001. Building the IBM 4758 secure coprocessor. IEEE Computer. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Gibson, G. A., Hellerstein, L., Karp, R. M., Katz, R. H., and Patterson, D. A. 1989. Failure correction techniques for large disk arrays. In Proceedings of the 3rd International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS). 123--132. Boston. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Heiner, J., Collins, N., and Wirthlin, M. 2008. Fault tolerant ICAP controller for high-reliable internal scrubbing. In Proceedings of the Aerospace Conference. 1--10.Google ScholarGoogle Scholar
  11. Herveille, R. 2001. http://www.opencores.org/projects.cgi/web/i2c/overview.Google ScholarGoogle Scholar
  12. Kocher, P., Jaffe, J., and Jun, B. 1999. Differential power analysis. In Proceedings of the Advances in Cryptology (CRYPTO’99). Lecture Notes in Computer Science, vol. 1666. Springer-Verlag, 388--397. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Kommerling, O. and Kuhn, M. 1999. Design principles for tamper-resistant smartcard processors. In Proceedings of the USENIX Workshop on Smartcard Technology (Smartcard’99). 9--20. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Saxena, N. R., Franco, P., and McCluskey, E. J. 1992. Simple bounds on serial signature analysis aliasing for random testing. IEEE Trans. Comput. (Special Issue on Fault Tolerant Computing) 41, 5, 638--645. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Steiner, N. J. 2002. A standalone wire database for routing and tracing in Xilinx Virtex, Virtex-E, and Virtex-II FPGAs. Master Thesis of Electrical Engineering, Virginia Polytechnic Institute and State University.Google ScholarGoogle Scholar
  16. Trimberger, S. 2007. Trusted design in FPGAs. In Proceedings of the Design Automation Conference (DAC). 5--8. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Weingart, S. H. 2000. Physical security devices for computer subsystems: A survey of attacks and defenses. Workshop on Cryptographic Hardware and Embedded Systems. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Wollinger, T. and Paar, C. 2003. How secure are FPGAs in cryptographic applications? In Proceedings of the International Conference on Field Programmable Logic and Applications (FPL).Google ScholarGoogle Scholar
  19. Wollinger, T., Guajardo, J., and Paar, C. 2003. Cryptography on FPGAs: State of the art implementations and attacks. ACM Trans. Embed. Comput. Syst. (Special Issue on Embedded Systems and Security). Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Yang, B., Wu, K. and Karri, R. 2005. Secure scan: A design-for-test architecture for crypto chips. In Proceedings of the Design Automation Conference (DAC). Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Trust-Based Design and Check of FPGA Circuits Using Two-Level Randomized ECC Structures

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      Full Access

      • Published in

        cover image ACM Transactions on Reconfigurable Technology and Systems
        ACM Transactions on Reconfigurable Technology and Systems  Volume 2, Issue 1
        March 2009
        142 pages
        ISSN:1936-7406
        EISSN:1936-7414
        DOI:10.1145/1502781
        Issue’s Table of Contents

        Copyright © 2009 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 1 March 2009
        • Revised: 1 January 2009
        • Accepted: 1 January 2009
        • Received: 1 May 2008
        Published in trets Volume 2, Issue 1

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article
        • Research
        • Refereed

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader