ASSURE: RTL Locking Against an Untrusted Foundry
نویسندگان
چکیده
Semiconductor design companies are integrating proprietary intellectual property (IP) blocks to build custom integrated circuits (IC) and fabricate them in a third-party foundry. Unauthorized IC copies cost these billions of dollars annually. While several methods have been proposed for hardware IP obfuscation, they operate on the gate-level netlist, i.e., after synthesis tools embed semantic information into netlist. We propose ASSURE protect modules operating register-transfer level (RTL) description. The RTL approach has three advantages: (i) it allows designers obfuscate cores generated with many different (e.g., generators, high-level tools, pre-existing IPs). (ii) obfuscates semantics an before logic synthesis; (iii) does not require modifications EDA flows. perform security assessment ASSURE.
منابع مشابه
Cyclic Locking and Memristor-based Obfuscation Against CycSAT and Inside Foundry Attacks
The high cost of IC design has made chip protection one of the first priorities of the semiconductor industry. Although there is a common impression that combinational circuits must be designed without any cycles, circuits with cycles can be combinational as well. Such cyclic circuits can be used to reliably lock ICs. Moreover, since memristor is compatible with CMOS structure, it is possible t...
متن کاملProtecting Against Untrusted Relays: An Information Self-encrypted Approach
The reliability and transmission distance are generally limited for the wireless communications due to the severe channel fading. As an effective way to resist the channel fading, cooperative relaying is usually adopted in wireless networks where neighbouring nodes act as relays to help the transmission between the source and the destination. Most research works simply regard these cooperative ...
متن کاملLanguage-based Defenses Against Untrusted Browser Origins
We present new attacks and robust countermeasures for security-sensitive components, such as single sign-on APIs and client-side cryptographic libraries, that need to be safely deployed on untrusted web pages. We show how failing to isolate such components leaves them vulnerable to attacks both from the hosting website and other components running on the same page. These attacks are not prevent...
متن کاملUnix as an Untrusted Library
Unix was born a small simple operating system. Today it’s a large, complicated, feature-rich system. As more and more features are added, the overall system complexity increases and performance and reliability suffer. Further, the pace of technical innovation is slow since modifying a complex kernel is hard. Thus, few of the ideas produced by systems research over the past twenty years have bee...
متن کاملVirtualization Based Password Protection against Malware in Untrusted Operating Systems
Password based authentication remains as the mainstream user authentication method for most web servers, despite its known vulnerability to keylogger attacks. Most existing countermeasures are costly because they require a strong isolation of the browser and the operating system. In this paper, we propose KGuard, a password input protection system. Its security is based on the hardware-based vi...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Very Large Scale Integration Systems
سال: 2021
ISSN: ['1063-8210', '1557-9999']
DOI: https://doi.org/10.1109/tvlsi.2021.3074004