DocumentCode :
129311
Title :
Embedded reconfigurable logic for ASIC design obfuscation against supply chain attacks
Author :
Bao Liu ; Wang, Bingdong
Author_Institution :
Univ. of Texas at San Antonio, San Antonio, TX, USA
fYear :
2014
fDate :
24-28 March 2014
Firstpage :
1
Lastpage :
6
Abstract :
Hardware is the foundation and the root of trust of any security system. However, in today´s global IC industry, an IP provider, an IC design house, a CAD company, or a foundry may subvert a VLSI system with back doors or logic bombs. Such a supply chain adversary´s capability is rooted in his knowledge on the hardware design. Successful hardware design obfuscation would severely limit a supply chain adversary´s capability if not preventing all supply chain attacks. However, not all designs are obfuscatable in traditional technologies. We propose to achieve ASIC design obfuscation based on embedded reconfigurable logic which is determined by the end user and unknown to any party in the supply chain. Combined with other security techniques, embedded reconfigurable logic can provide the root of ASIC design obfuscation, data confidentiality and tamper-proofness. As a case study, we evaluate hardware-based code injection attacks and reconfiguration-based instruction set obfuscation based on an open source SPARC processor LEON2. We prevent program monitor Trojan attacks and increase the area of a minimum code injection Trojan with a 1KB ROM by 2.38% for every 1% area increase of the LEON2 processor.
Keywords :
VLSI; application specific integrated circuits; electronic engineering computing; integrated circuit design; invasive software; ASIC design obfuscation; CAD company; IC design house; IP provider; ROM; Trojan attacks; VLSI system; back doors; data confidentiality; embedded reconfigurable logic; global IC industry; hardware design; hardware-based code injection attacks; logic bombs; minimum code injection Trojan; open source SPARC processor LEON2; reconfiguration-based instruction set obfuscation; security techniques; supply chain adversary capability; supply chain attacks; tamper-proofness; Foundries; Hardware; Logic gates; Multiplexing; Supply chains; Trojan horses;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Design, Automation and Test in Europe Conference and Exhibition (DATE), 2014
Conference_Location :
Dresden
Type :
conf
DOI :
10.7873/DATE.2014.256
Filename :
6800457
Link To Document :
بازگشت