Garbled EDA: Privacy Preserving Electronic Design Automation

08/07/2022
by   Mohammad Hashemi, et al.
0

The complexity of modern integrated circuits (ICs) necessitates collaboration between multiple distrusting parties, including thirdparty intellectual property (3PIP) vendors, design houses, CAD/EDA tool vendors, and foundries, which jeopardizes confidentiality and integrity of each party's IP. IP protection standards and the existing techniques proposed by researchers are ad hoc and vulnerable to numerous structural, functional, and/or side-channel attacks. Our framework, Garbled EDA, proposes an alternative direction through formulating the problem in a secure multi-party computation setting, where the privacy of IPs, CAD tools, and process design kits (PDKs) is maintained. As a proof-of-concept, Garbled EDA is evaluated in the context of simulation, where multiple IP description formats (Verilog, C, S) are supported. Our results demonstrate a reasonable logical-resource cost and negligible memory overhead. To further reduce the overhead, we present another efficient implementation methodology, feasible when the resource utilization is a bottleneck, but the communication between two parties is not restricted. Interestingly, this implementation is private and secure even in the presence of malicious adversaries attempting to, e.g., gain access to PDKs or in-house IPs of the CAD tool providers.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
09/26/2022

TrustToken, a Trusted SoC solution for Non-Trusted Intellectual Property (IP)s

Secure and trustworthy execution in heterogeneous SoCs is a major priori...
research
07/29/2020

Secure Computation Framework for Multiple Data Providers Against Malicious Adversaries

Due to the great development of secure multi-party computation, many pra...
research
10/06/2020

Secure Collaborative Training and Inference for XGBoost

In recent years, gradient boosted decision tree learning has proven to b...
research
05/12/2019

Secure Error Correction using Multi-Party Computation

During recent years with the increase of data and data analysis needs, p...
research
12/09/2021

How Not to Protect Your IP – An Industry-Wide Break of IEEE 1735 Implementations

Modern hardware systems are composed of a variety of third-party Intelle...
research
06/30/2022

Accountable Private Set Cardinality for Distributed Measurement

We introduce cryptographic protocols for securely and efficiently comput...
research
02/04/2021

Privacy Preserving and Resilient RPKI

Resource Public Key Infrastructure (RPKI) is vital to the security of in...

Please sign up or login with your details

Forgot password? Click here to reset