Font Size: a A A

Hardware security through design obfuscation

Posted on:2011-02-07Degree:Ph.DType:Dissertation
University:Case Western Reserve UniversityCandidate:Chakraborty, Rajat SubhraFull Text:PDF
GTID:1448390002461688Subject:Computer Science
Abstract/Summary:
Security of integrated circuits (ICs) has emerged as a major concern at different stages of IC life-cycle, spanning design, test, fabrication and deployment. Modern ICs are becoming increasingly vulnerable to various forms of security threats, such as: (1) illegal use of hardware intellectual property (IP) or "IP Piracy"; (2) illegal manufacturing of IC or "IC Piracy"; (3) insertion of malicious circuits, referred as "Hardware Trojan", in a design to cause in-field circuit malfunction, and (4) leakage of secret information from an IC. These security threats are accentuated by current IC design practices, such as the widespread use of hardware IP modules to design complex system-on-chips (SoCs). In addition, the economics of electronic manufacturing dictates widespread outsourcing of integrated circuit fabrication to off-shore facilities, which increases the vulnerability to these attacks. In this research, we explore novel hardware design approaches that incorporate a key-based design obfuscation scheme to effectively protect a design against various security threats, while incurring low hardware and computational overheads. Obfuscation is a technique that makes comprehending and reverse-engineering a design difficult. To the best of our knowledge, this is the first effort to develop a systematic and provably robust hardware obfuscation approach that enables hardware protection at different stages of the IC life-cycle. Effectiveness of these approaches for protection against IP reverse-engineering and piracy, hardware Trojan and scan-based information leakage is evaluated with benchmark circuits and open-source IP cores. The obfuscation approaches are developed for both firm (gate-level) and soft (register transfer level) IPs. The principles of the obfuscation approach have been extended to protection of embedded software against piracy and malicious modification. An enhanced secure IC design flow with associated computer-aided design (CAD) tools is also developed.
Keywords/Search Tags:Hardware, Security, Obfuscation, Piracy
Related items