skip to main content
10.1145/2459976.2459985acmotherconferencesArticle/Chapter ViewAbstractPublication PagescsiirwConference Proceedingsconference-collections
research-article

Interlocking obfuscation for anti-tamper hardware

Published: 08 January 2013 Publication History

Abstract

Tampering and Reverse Engineering of a chip to extract the hardware Intellectual Property (IP) core or to inject malicious alterations is a major concern. Digital systems susceptible to tampering are of immense concern to defense organizations. First, offshore chip manufacturing allows the design secrets of the IP cores to be transparent to the foundry and other entities along the production chain. Second, small malicious modifications to the design may not be detectable after fabrication without anti-tamper mechanisms. Some techniques have been developed in the past to improve the defense against such attacks but they tend to fall prey to the increasing power of the attacker. We present a new way to protect against tampering by a clever obfuscation of the design, which can be unlocked with a specific, dynamic path traversal. Hence, the functional mode of the controller is hidden with the help of obfuscated states, and the functional mode is made operational only on the formation of a specific interlocked Code-Word during state transition. No comparator is needed as the obfuscation is embedded within the transition function of the state machine itself. A side benefit is that any small alteration will be magnified via the obfuscated design. In other words, an alteration to the design will manifest itself as a large difference in the circuit's functionality. Experimental results on an Advanced Encryption Standard (AES) circuit from the open-source IP-cores suite suggest that the proposed method provides better active defense mechanisms against attacks with nominal (7.8%) area overhead.

References

[1]
Foreign infringement of intellectuaal property rights implications on selected U.S. industries. http://www.usitc.gov/publications/332/working_papers/id_14_100505.pdf.
[2]
Open Cores. http://www.opencores.org.
[3]
Chakraborty, R., and Bhunia, S. Harpoon: An Obfuscation-Based SoC Design Methodology for Hardware Protection. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2009.
[4]
Chakraborty, R., and Bhunia, S. RTL Hardware IP Protection Using Key-Based Control and Data Flow Obfuscation. In 23rd International Conference on VLSI Design, 2010. VLSID '10., pp. 405--410.
[5]
Fan, J., Guo, X., De Mulder, E., Schaumont, P., Preneel, B., and Verbauwhede, I. State-of-the-art of secure ECC implementations: a survey on known side-channel attacks and countermeasures. In IEEE International Symposium on Hardware Oriented Security and Trust (HOST), 2010.
[6]
Koushanfar, F. Provably Secure Active IC Metering Techniques for Piracy Avoidance and Digital Rights Management. IEEE Transactions on Information Forensics and Security, (feb. 2012).
[7]
Narasimhan, S. and Chakraborty, R. and Bhunia, S. Hardware IP Protection During Evaluation Using Embedded Sequential Trojan. IEEE Design Test of Computers, (2011).
[8]
Porter, R., Stone, S., Kim, Y., McDonald, J., and Starman, L. Dynamic Polymorphic Reconfiguration for anti-tamper circuits. In International Conference onField Programmable Logic and Applications, 2009. FPL 2009. (2009).

Cited By

View all
  • (2024)FSMLock: Sequential Logic Locking Through Encryption2024 31st International Conference on Mixed Design of Integrated Circuits and System (MIXDES)10.23919/MIXDES62605.2024.10614001(98-103)Online publication date: 27-Jun-2024
  • (2024)STATION: State Encoding-Based Attack-Resilient Sequential ObfuscationIEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems10.1109/TCAD.2024.338787343:10(2888-2901)Online publication date: Oct-2024
  • (2024)Locking Decision Tree with State Permutation Obfuscation: Software Implementation2024 22nd IEEE Interregional NEWCAS Conference (NEWCAS)10.1109/NewCAS58973.2024.10666302(353-357)Online publication date: 16-Jun-2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
CSIIRW '13: Proceedings of the Eighth Annual Cyber Security and Information Intelligence Research Workshop
January 2013
282 pages
ISBN:9781450316873
DOI:10.1145/2459976

Sponsors

  • Los Alamos National Labs: Los Alamos National Labs
  • Sandia National Labs: Sandia National Laboratories
  • DOE: Department of Energy
  • Oak Ridge National Laboratory
  • Lawrence Livermore National Lab.: Lawrence Livermore National Laboratory
  • BERKELEYLAB: Lawrence National Berkeley Laboratory
  • Argonne Natl Lab: Argonne National Lab
  • Idaho National Lab.: Idaho National Laboratory
  • Pacific Northwest National Laboratory
  • Nevada National Security Site: Nevada National Security Site

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 08 January 2013

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Research-article

Conference

CSIIRW '13
Sponsor:
  • Los Alamos National Labs
  • Sandia National Labs
  • DOE
  • Lawrence Livermore National Lab.
  • BERKELEYLAB
  • Argonne Natl Lab
  • Idaho National Lab.
  • Nevada National Security Site
CSIIRW '13: Cyber Security and Information Intelligence
January 8 - 10, 2013
Tennessee, Oak Ridge, USA

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)53
  • Downloads (Last 6 weeks)5
Reflects downloads up to 07 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2024)FSMLock: Sequential Logic Locking Through Encryption2024 31st International Conference on Mixed Design of Integrated Circuits and System (MIXDES)10.23919/MIXDES62605.2024.10614001(98-103)Online publication date: 27-Jun-2024
  • (2024)STATION: State Encoding-Based Attack-Resilient Sequential ObfuscationIEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems10.1109/TCAD.2024.338787343:10(2888-2901)Online publication date: Oct-2024
  • (2024)Locking Decision Tree with State Permutation Obfuscation: Software Implementation2024 22nd IEEE Interregional NEWCAS Conference (NEWCAS)10.1109/NewCAS58973.2024.10666302(353-357)Online publication date: 16-Jun-2024
  • (2024)Obfuscation of FSMs for Secure Outsourcing of Neural Network Inference onto FPGAs2024 IEEE International Symposium on Circuits and Systems (ISCAS)10.1109/ISCAS58744.2024.10558279(1-5)Online publication date: 19-May-2024
  • (2024)Securing Finite State Machines through Obfuscation Modes and Diverse Flip-Flop Configurations2024 International Conference on Consumer Electronics - Taiwan (ICCE-Taiwan)10.1109/ICCE-Taiwan62264.2024.10674645(287-288)Online publication date: 9-Jul-2024
  • (2024)Hyperloop: A Cybersecurity Perspective2024 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)10.1109/EuroSPW61312.2024.00045(352-360)Online publication date: 8-Jul-2024
  • (2024)Hardware Security for IC Piracy: Logic Locking Past, Present and OpportunityAdvances in Microelectronics, Embedded Systems and IoT10.1007/978-981-97-0767-6_1(1-11)Online publication date: 19-May-2024
  • (2024)Advances in Logic LockingHardware Security10.1007/978-3-031-58687-3_2(53-142)Online publication date: 3-Apr-2024
  • (2023)A Novel FPGA Implementation of the NAND-PUF with Minimal Resource Usage and High ReliabilityCryptography10.3390/cryptography70200187:2(18)Online publication date: 3-Apr-2023
  • (2023)Hardware Obfuscation Based Watermarking Technique for IPR Ownership IdentificationInternational Journal of Reconfigurable Computing10.1155/2023/45507582023Online publication date: 1-Jan-2023
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media