Abstract

Logic Encryption is a hardware security technique that protects integrated circuit designs that are fabricated at untrusted pure play foundries from being pirated or maliciously modified. In the technique, logic gates are added to the design that are driven by an added key input bus, such that the correct behavior of the circuit is recovered with only the exact correct key input pattern. However, the power, performance, and area (PPA) cost of implementing logic encryption has often been ignored in the literature in favor of increasing the level of security provided. This has proved to be a significant hurdle in transitioning the method to use in commercial-grade designs and a systematic methodology of constraining the cost of logic encryption is needed. In this paper, we propose a generalized Constraint-Directed Logic Encryption (CDLE) methodology. In CDLE, the potential design space of encrypted versions of a circuit is searched to apply logic encryption under PPA constraints. Two example CDLE methods are proposed. The first is a concurrent tree search method which uses commercial tools to sample designs for their PPA cost and determine the optimal encryption strategy. In this method, PPA cost is accurately analyzed at the cost of heavy runtime. The second is a machine learning approach which estimates the PPA cost to predict the optimal encryption strategy. The machine learning model developed in this work is limited, but the results are promising as a direction for study in logic encryption. Detailed experimental results evaluating both methods are presented.

Highlights

  • The rising cost of manufacturing integrated circuits (ICs) has lead many circuit design houses to outsource their fabrication by contracting third party pure play foundries to reduce production costs [1], [2]

  • The globalization of IC production has opened an opportunity for bad actors at untrusted foundries to maliciously mishandle, steal, or modify the intellectual property (IP) of circuit designers

  • Koushanfar, and Markov [2] proposed a new hardware security technique to prevent the piracy of IC designs known as logic encryption

Read more

Summary

INTRODUCTION

The rising cost of manufacturing integrated circuits (ICs) has lead many circuit design houses to outsource their fabrication by contracting third party pure play foundries to reduce production costs [1], [2]. This has come at the cost of reduced trust in the IC supply chain. Some popular foundries are located in countries with weak IP protection policies and enforcement, compounding the issue [2] This has lead to an estimated annual cost of over $100 billion to the semiconductor industry in piracy and damages [3], [4].

LOGIC ENCRYPTION
BACKGROUND
CONSTRAINT-DIRECTED LOGIC ENCRYPTION
EXAMPLE
CDLE CONCURRENT TREE SEARCH
SECURITY EVALUATION OF ENCRYPTION SCHEMES
METHOD ALGORITHM
MODIFIED CONCURRENT TREE SEARCH
CASE STUDY
VIII. CONCLUSION AND FUTURE WORK
Findings
FUTURE WORK
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call