论文标题

DLOCKOUT:一种用于关键混淆RTL IP设计的设计锁定技术

DLockout: A Design Lockout Technique for Key Obfuscated RTL IP Designs

论文作者

Islam, Sheikh Ariful, Sah, Love Kumar, Katkoori, Srinivas

论文摘要

知识产权(IP)侵权(包括盗版和过度生产)已成为半导体供应链中的重大威胁。基于密钥的混淆技术(即逻辑锁定)被广泛应用于保护遗产IP免受此类攻击。但是,基本的问题仍然是悬而未决的,是否允许攻击者有大量的时间来寻求正确的钥匙,或者在几次不正确的尝试后以非破坏性方式锁定设计很有用。在本文中,我们通过强大的设计锁定技术解决了这个问题。具体而言,我们对混淆逻辑输出进行比较,该输出反映了不改变系统行为而无需更改系统行为的条件(正确或不正确)。当与关键混淆(逻辑锁定)技术结合使用时,提出的方法会增加反向工程钥匙混淆的RTL模块的困难。我们对三个常见的侧渠道攻击进行了对DLOCKOUT的安全评估,然后对弹性进行定量评估。在典型的设计角下,我们在四个DataPath密集的IP和一个加密芯核上进行了一组实验,并在典型的设计角下进行了三个不同的关键长度(32-,64-和128位)。平均而言,Dlockout会造成可忽略不计的区域,功率和​​延迟开销。

Intellectual Property (IP) infringement including piracy and over production have emerged as significant threats in the semiconductor supply chain. Key based obfuscation techniques (i.e., logic locking) are widely applied to secure legacy IP from such attacks. However, the fundamental question remains open whether an attacker is allowed an exponential amount of time to seek correct key or could it be useful to lock out the design in a non-destructive manner after several incorrect attempts. In this paper, we address this question with a robust design lockout technique. Specifically, we perform comparisons on obfuscation logic output that reflects the condition (correct or incorrect) of the applied key without changing the system behaviour. The proposed approach, when combined with key obfuscation (logic locking) technique, increases the difficulty of reverse engineering key obfuscated RTL module. We provide security evaluation of DLockout against three common side channel attacks followed by a quantitative assessment of the resilience. We conducted a set of experiments on four datapath intensive IPs and one crypto core for three different key lengths (32-, 64-, and 128-bit) under typical design corner. On average, DLockout incurs negligible area, power, and delay overheads.

扫码加入交流群

加入微信交流群

微信交流群二维码

扫码加入学术交流群,获取更多资源