High-level Intellectual Property Obfuscation via Decoy Constants

05/13/2021
by   Levent Aksoy, et al.
0

This paper presents a high-level circuit obfuscation technique to prevent the theft of intellectual property (IP) of integrated circuits. In particular, our technique protects a class of circuits that relies on constant multiplications, such as filters and neural networks, where the constants themselves are the IP to be protected. By making use of decoy constants and a key-based scheme, a reverse engineer adversary at an untrusted foundry is rendered incapable of discerning true constants from decoy constants. The time-multiplexed constant multiplication (TMCM) block of such circuits, which realizes the multiplication of an input variable by a constant at a time, is considered as our case study for obfuscation. Furthermore, two TMCM design architectures are taken into account; an implementation using a multiplier and a multiplierless shift-adds implementation. Optimization methods are also applied to reduce the hardware complexity of these architectures. The well-known satisfiability (SAT) and automatic test pattern generation (ATPG) attacks are used to determine the vulnerability of the obfuscated designs. It is observed that the proposed technique incurs small overheads in area, power, and delay that are comparable to the hardware complexity of prominent logic locking methods. Yet, the advantage of our approach is in the insight that constants – instead of arbitrary circuit nodes – become key-protected.

READ FULL TEXT

page 1

page 2

page 3

page 4

page 5

page 6

page 7

research
05/26/2020

Efficacy of Satisfiability Based Attacks in the Presence of Circuit Reverse Engineering Errors

Intellectual Property (IP) theft is a serious concern for the integrated...
research
02/21/2022

Hardware Obfuscation of Digital FIR Filters

A finite impulse response (FIR) filter is a ubiquitous block in digital ...
research
05/02/2023

Randomized Reversible Gate-Based Obfuscation for Secured Compilation of Quantum Circuit

The success of quantum circuits in providing reliable outcomes for a giv...
research
09/05/2022

Leveraging Layout-based Effects for Locking Analog ICs

While various obfuscation methods exist in the digital domain, technique...
research
03/29/2020

Analytical Estimation and Localization of Hardware Trojan Vulnerability in RTL Designs

Offshoring the proprietary Intellectual property (IP) has recently incre...
research
05/21/2022

Multiplierless Design of Very Large Constant Multiplications in Cryptography

This brief addresses the problem of implementing very large constant mul...
research
09/11/2023

Multiplierless Design of High-Speed Very Large Constant Multiplications

In cryptographic algorithms, the constants to be multiplied by a variabl...

Please sign up or login with your details

Forgot password? Click here to reset