ReTrustFSM: Toward RTL Hardware Obfuscation-A Hybrid FSM Approach

نویسندگان

چکیده

Hardware obfuscating is a proactive design-for-trust technique against IC supply chain threats, i.e., IP piracy and overproduction. Many studies have evaluated numerous techniques for obfuscation purposes. Nevertheless, de-obfuscation attacks demonstrated their insufficiency. This paper proposes register-transfer (RT) level finite-state-machine (FSM) called ReTrustFSM that allows designers to obfuscate at the earliest possible stage. combines three types of secrecy: explicit external secrecy via an key, implicit based on specific clock cycles, internal through concealed FSM transition function. So, robustness relies primary input patterns, cycle accuracy applying such stimuli. Additionally, defines cohesive relationship between features Boolean problems required time de-obfuscation, ensuring maximum execution oracle-guided attacks. Various are employed test ReTrustFSM’s robustness, including structural machine learning attacks, functional I/O queries (BMC), We also analyzed corruptibility overhead design-under-obfuscation. Our experimental results demonstrate acceptable overhead/corruption while resisting threat models.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A FSM Extractor for HDL Description at RTL Level

Due to the increasing complexity of modern circuit designs, HDL based design methodology is getting popular. Because Finite State Machines (FSMs) and datapaths have significantly different properties, dealing them with two different ways is a trend of many CAD tools. However, how to extract FSMs from the original HDL automatically is still a problem. Furthermore, automatic FSM optimization and ...

متن کامل

Toward a TLM to RTL refinement: a formal approach

Due to increasing complexity of SoC and shortening life time cycle of product, time to market becomes a major challenge in SoC design. To overcome this problem, an abstract representation of the platform under development can be used by software developers at the early stage of the development. This abstracted platform is then refined until its complete specification. For now, it remains diffic...

متن کامل

HOP: Hardware makes Obfuscation Practical

Program obfuscation is a central primitive in cryptography, and has important real-world applications in protecting software from IP theft. However, well known results from the cryptographic literature have shown that software only virtual black box (VBB) obfuscation of general programs is impossible. In this paper we propose HOP, a system (with matching theoretic analysis) that achieves simula...

متن کامل

Program Obfuscation with Leaky Hardware

We consider general program obfuscation mechanisms using “somewhat trusted” hardware devices, with the goal of minimizing the usage of the hardware, its complexity, and the required trust. Specifically, our solution has the following properties: (i) The obfuscation remains secure even if all the hardware devices in use are leaky. That is, the adversary can obtain the result of evaluating any fu...

متن کامل

HWML: RTL/Structural Hardware Description using ML

This paper describes how functional programming techniques can be used to obtain simple, compact and highly expressive hardware descriptions even for complex designs. We use the functional programming language ML to describe the hardware structure of a system using a library for basic circuit construction and transformation tasks. The result is an RTL/structural description of the desired circu...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Access

سال: 2023

ISSN: ['2169-3536']

DOI: https://doi.org/10.1109/access.2023.3244902