ASSURE: RTL Locking Against an Untrusted Foundry

نویسندگان

چکیده

Semiconductor design companies are integrating proprietary intellectual property (IP) blocks to build custom integrated circuits (IC) and fabricate them in a third-party foundry. Unauthorized IC copies cost these billions of dollars annually. While several methods have been proposed for hardware IP obfuscation, they operate on the gate-level netlist, i.e., after synthesis tools embed semantic information into netlist. We propose ASSURE protect modules operating register-transfer level (RTL) description. The RTL approach has three advantages: (i) it allows designers obfuscate cores generated with many different (e.g., generators, high-level tools, pre-existing IPs). (ii) obfuscates semantics an before logic synthesis; (iii) does not require modifications EDA flows. perform security assessment ASSURE.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Cyclic Locking and Memristor-based Obfuscation Against CycSAT and Inside Foundry Attacks

The high cost of IC design has made chip protection one of the first priorities of the semiconductor industry. Although there is a common impression that combinational circuits must be designed without any cycles, circuits with cycles can be combinational as well. Such cyclic circuits can be used to reliably lock ICs. Moreover, since memristor is compatible with CMOS structure, it is possible t...

متن کامل

Protecting Against Untrusted Relays: An Information Self-encrypted Approach

The reliability and transmission distance are generally limited for the wireless communications due to the severe channel fading. As an effective way to resist the channel fading, cooperative relaying is usually adopted in wireless networks where neighbouring nodes act as relays to help the transmission between the source and the destination. Most research works simply regard these cooperative ...

متن کامل

Language-based Defenses Against Untrusted Browser Origins

We present new attacks and robust countermeasures for security-sensitive components, such as single sign-on APIs and client-side cryptographic libraries, that need to be safely deployed on untrusted web pages. We show how failing to isolate such components leaves them vulnerable to attacks both from the hosting website and other components running on the same page. These attacks are not prevent...

متن کامل

Unix as an Untrusted Library

Unix was born a small simple operating system. Today it’s a large, complicated, feature-rich system. As more and more features are added, the overall system complexity increases and performance and reliability suffer. Further, the pace of technical innovation is slow since modifying a complex kernel is hard. Thus, few of the ideas produced by systems research over the past twenty years have bee...

متن کامل

Virtualization Based Password Protection against Malware in Untrusted Operating Systems

Password based authentication remains as the mainstream user authentication method for most web servers, despite its known vulnerability to keylogger attacks. Most existing countermeasures are costly because they require a strong isolation of the browser and the operating system. In this paper, we propose KGuard, a password input protection system. Its security is based on the hardware-based vi...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Transactions on Very Large Scale Integration Systems

سال: 2021

ISSN: ['1063-8210', '1557-9999']

DOI: https://doi.org/10.1109/tvlsi.2021.3074004