skip to main content
10.1145/3394885.3431601acmconferencesArticle/Chapter ViewAbstractPublication PagesaspdacConference Proceedingsconference-collections
research-article

Area Efficient Functional Locking through Coarse Grained Runtime Reconfigurable Architectures

Authors Info & Claims
Published:29 January 2021Publication History

ABSTRACT

The protection of Intellectual Property (IP) has emerged as one of the most important issues in the hardware design industry. Most VLSI design companies are now fabless and need to protect their IP from being illegally distributed. One of the main approach to address this has been through logic locking. Logic locking prevents IPs from being reversed engineered as well as overbuilding the hardware circuit by untrusted foundries. One of the main problem with existing logic locking techniques is that the foundry has full access to the entire design including the logic locking mechanism. Because of the importance of this topic, continuous more robust locking mechanisms are proposed and equally fast new methods to break them appear. One alternative approach is to lock a circuit through omission. The main idea is to selectively map a portion of the IP onto an embedded FPGA (eFPGA). Because the foundry does not have access to the bitstream, the circuit cannot be used until programmed by the legitimate user. One of the main problems with this approach is the large overhead in terms of area and power, as well as timing degradation. Area is especially a concern for price sensitive applications. To address this, in this work we presents a method to map portions of a design onto a Coarse Grained Runtime Reconfigurable Architecture (CGRRA) such that multiple parts of a design can be hidden onto the CGRRA, substantially amortizing the area overhead introduced by the CGRRA.

References

  1. A. Balachandran and B Carrion Schafer. 2020. Efficient Functional Locking of Behavioral IPs. In MWCAS. 639--642.Google ScholarGoogle Scholar
  2. Benjamin Carrion Schafer and Anushree Mahapatra. 2014. S2CBench: Synthesizable System C Benchmark Suite. IEEE Embedded Systems Letters 6, 3 (2014), 53--56.Google ScholarGoogle ScholarCross RefCross Ref
  3. R. S. Chakraborty and S. Bhunia. 2009. HARPOON: An Obfuscation-Based SoC Design Methodology for Hardware Protection. IEEE TCAD 28, 10 (Oct 2009), 1493--1502.Google ScholarGoogle Scholar
  4. Renesas Electronics. 2020. Stream Transpose Processor. Retrieved June 2, 2020 from https://www.renesas.com/us/en/products/power-management/pmic/stp-engine.htmlGoogle ScholarGoogle Scholar
  5. T. Hoque, R. S. Chakraborty, and S. Bhunia. 2020. Hardware Obfuscation and Logic Locking: A Tutorial Introduction. IEEE Design Test 37, 3 (2020), 59--77.Google ScholarGoogle ScholarCross RefCross Ref
  6. Changmoo Kim, Moo-Kyoung Chung, Yeon-Gon Cho, Mario Konijnenburg, Soojung Ryu, and Jeongwook Kim. 2012. ULP-SRP: Ultra low power Samsung Re-configurable Processor for biomedical applications. 2012 International Conference on Field-Programmable Technology (2012), 329--334.Google ScholarGoogle ScholarCross RefCross Ref
  7. I. Kuon and J. Rose. 2007. Measuring the Gap Between FPGAs and ASICs. IEEE TCAD 26, 2 (2007), 203--215.Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Bao Liu et al. 2014. Embedded Reconfigurable Logic for ASIC Design Obfuscation Against Supply Chain Attacks. In DATE. 243:1--243:6.Google ScholarGoogle Scholar
  9. Christian Pilato, Francesco Regazzoni, Ramesh Karri, and Siddharth Garg. 2018. TAO: Techniques for Algorithm-Level Obfuscation during High-Level Synthesis (DAC '18). Association for Computing Machinery, New York, NY, USA, Article 155, 6 pages.Google ScholarGoogle Scholar
  10. Christian Pilato, Kaijie Wu, Siddharth Garg, Ramesh Karri, and Francesco Regazzoni. 2019. TaintHLS: High-Level Synthesis for Dynamic Information Flow Tracking. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 38, 5 (2019), 798--808.Google ScholarGoogle ScholarCross RefCross Ref
  11. J. Rajendran, O. Sinanoglu, and R. Karri. 2013. Is split manufacturing secure?. In DATE. 1259--1264.Google ScholarGoogle Scholar
  12. Jarrod A. Roy et al. 2008. EPIC: Ending Piracy of Integrated Circuits. In DATE. 1069--1074.Google ScholarGoogle Scholar
  13. M. M. Shihab et al. 2019. Design Obfuscation through Selective Post-Fabrication Transistor-Level Programming. In DATE. 528--533.Google ScholarGoogle Scholar
  14. T. Winograd et al. 2016. Hybrid STT-CMOS designs for reverse-engineering prevention. In DAC. 1--6.Google ScholarGoogle Scholar
  15. Henry Wong, Vaughn Betz, and Jonathan Rose. 2011. Comparing FPGA vs. Custom Cmos and the Impact on Processor Microarchitecture. In FPGA. ACM, 5--14.Google ScholarGoogle Scholar
  16. Muhammad Yasin et al. 2017. What to Lock? Functional and Parametric Locking. In GLSVLSI. ACM, New York, NY, USA, 351--356. https://doi.org/10.1145/3060403.3060492Google ScholarGoogle Scholar
  17. J. Zhang. 2016. A Practical Logic Obfuscation Technique for Hardware Security. IEEE Transactions on Very Large Scale Integration (VLSI) Systems 24, 3 (2016), 1193--1197.Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Area Efficient Functional Locking through Coarse Grained Runtime Reconfigurable Architectures

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          ASPDAC '21: Proceedings of the 26th Asia and South Pacific Design Automation Conference
          January 2021
          930 pages
          ISBN:9781450379991
          DOI:10.1145/3394885

          Copyright © 2021 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 29 January 2021

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article
          • Research
          • Refereed limited

          Acceptance Rates

          ASPDAC '21 Paper Acceptance Rate111of368submissions,30%Overall Acceptance Rate466of1,454submissions,32%

          Upcoming Conference

          ASPDAC '25

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader