Exploring eFPGA-based Redaction for IP Protection

10/26/2021
by   Jitendra Bhandari, et al.
0

Recently, eFPGA-based redaction has been proposed as a promising solution for hiding parts of a digital design from untrusted entities, where legitimate end-users can restore functionality by loading the withheld bitstream after fabrication. However, when deciding which parts of a design to redact, there are a number of practical issues that designers need to consider, including area and timing overheads, as well as security factors. Adapting an open-source FPGA fabric generation flow, we perform a case study to explore the trade-offs when redacting different modules of open-source intellectual property blocks (IPs) and explore how different parts of an eFPGA contribute to the security. We provide new insights into the feasibility and challenges of using eFPGA-based redaction as a security solution.

READ FULL TEXT

page 2

page 7

research
11/08/2021

Not All Fabrics Are Created Equal: Exploring eFPGA Parameters For IP Redaction

Semiconductor design houses rely on third-party foundries to manufacture...
research
05/05/2020

LiteX: an open-source SoC builder and library based on Migen Python DSL

LiteX is a GitHub-hosted SoC builder / IP library and utilities that can...
research
09/02/2022

Don't CWEAT It: Toward CWE Analysis Techniques in Early Stages of Hardware Design

To help prevent hardware security vulnerabilities from propagating to la...
research
06/03/2018

Concerted Wire Lifting: Enabling Secure and Cost-Effective Split Manufacturing

Here we advance the protection of split manufacturing (SM)-based layouts...
research
03/20/2023

Shedding Light on Static Partitioning Hypervisors for Arm-based Mixed-Criticality Systems

In this paper, we aim to understand the properties and guarantees of sta...
research
10/17/2022

AMF-Placer 2.0: Open Source Timing-driven Analytical Mixed-size Placer for Large-scale Heterogeneous FPGA

On modern field-programmable gate arrays (FPGAs), certain critical path ...
research
01/27/2021

Analyzing the Overhead of Filesystem Protection Using Linux Security Modules

Over the years, the complexity of the Linux Security Module (LSM) is kee...

Please sign up or login with your details

Forgot password? Click here to reset