ReTrustFSM: Toward RTL Hardware Obfuscation-A Hybrid FSM Approach
نویسندگان
چکیده
Hardware obfuscating is a proactive design-for-trust technique against IC supply chain threats, i.e., IP piracy and overproduction. Many studies have evaluated numerous techniques for obfuscation purposes. Nevertheless, de-obfuscation attacks demonstrated their insufficiency. This paper proposes register-transfer (RT) level finite-state-machine (FSM) called ReTrustFSM that allows designers to obfuscate at the earliest possible stage. combines three types of secrecy: explicit external secrecy via an key, implicit based on specific clock cycles, internal through concealed FSM transition function. So, robustness relies primary input patterns, cycle accuracy applying such stimuli. Additionally, defines cohesive relationship between features Boolean problems required time de-obfuscation, ensuring maximum execution oracle-guided attacks. Various are employed test ReTrustFSM’s robustness, including structural machine learning attacks, functional I/O queries (BMC), We also analyzed corruptibility overhead design-under-obfuscation. Our experimental results demonstrate acceptable overhead/corruption while resisting threat models.
منابع مشابه
A FSM Extractor for HDL Description at RTL Level
Due to the increasing complexity of modern circuit designs, HDL based design methodology is getting popular. Because Finite State Machines (FSMs) and datapaths have significantly different properties, dealing them with two different ways is a trend of many CAD tools. However, how to extract FSMs from the original HDL automatically is still a problem. Furthermore, automatic FSM optimization and ...
متن کاملToward a TLM to RTL refinement: a formal approach
Due to increasing complexity of SoC and shortening life time cycle of product, time to market becomes a major challenge in SoC design. To overcome this problem, an abstract representation of the platform under development can be used by software developers at the early stage of the development. This abstracted platform is then refined until its complete specification. For now, it remains diffic...
متن کاملHOP: Hardware makes Obfuscation Practical
Program obfuscation is a central primitive in cryptography, and has important real-world applications in protecting software from IP theft. However, well known results from the cryptographic literature have shown that software only virtual black box (VBB) obfuscation of general programs is impossible. In this paper we propose HOP, a system (with matching theoretic analysis) that achieves simula...
متن کاملProgram Obfuscation with Leaky Hardware
We consider general program obfuscation mechanisms using “somewhat trusted” hardware devices, with the goal of minimizing the usage of the hardware, its complexity, and the required trust. Specifically, our solution has the following properties: (i) The obfuscation remains secure even if all the hardware devices in use are leaky. That is, the adversary can obtain the result of evaluating any fu...
متن کاملHWML: RTL/Structural Hardware Description using ML
This paper describes how functional programming techniques can be used to obtain simple, compact and highly expressive hardware descriptions even for complex designs. We use the functional programming language ML to describe the hardware structure of a system using a library for basic circuit construction and transformation tasks. The result is an RTL/structural description of the desired circu...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Access
سال: 2023
ISSN: ['2169-3536']
DOI: https://doi.org/10.1109/access.2023.3244902