Visible to the public FORTIS: A Comprehensive Solution for Establishing Forward Trust for Protecting IPs and ICs

TitleFORTIS: A Comprehensive Solution for Establishing Forward Trust for Protecting IPs and ICs
Publication TypeJournal Article
Year of Publication2016
AuthorsGuin, Ujjwal, Shi, Qihang, Forte, Domenic, Tehranipoor, Mark M.
JournalACM Trans. Des. Autom. Electron. Syst.
Volume21
Pagination63:1–63:20
ISSN1084-4309
Keywords3PIP, Encryption, IC overproduction, IP overuse, pubcrawl, Resiliency, supply chain, supply chain security, system-on-chip
Abstract

With the advent of globalization in the semiconductor industry, it is necessary to prevent unauthorized usage of third-party IPs (3PIPs), cloning and unwanted modification of 3PIPs, and unauthorized production of ICs. Due to the increasing complexity of ICs, system-on-chip (SoC) designers use various 3PIPs in their design to reduce time-to-market and development costs, which creates a trust issue between the SoC designer and the IP owners. In addition, as the ICs are fabricated around the globe, the SoC designers give fabrication contracts to offshore foundries to manufacture ICs and have little control over the fabrication process, including the total number of chips fabricated. Similarly, the 3PIP owners lack control over the number of fabricated chips and/or the usage of their IPs in an SoC. Existing research only partially addresses the problems of IP piracy and IC overproduction, and to the best of our knowledge, there is no work that considers IP overuse. In this article, we present a comprehensive solution for preventing IP piracy and IC overproduction by assuring forward trust between all entities involved in the SoC design and fabrication process. We propose a novel design flow to prevent IC overproduction and IP overuse. We use an existing logic encryption technique to obfuscate the netlist of an SoC or a 3PIP and propose a modification to enable manufacturing tests before the activation of chips which is absolutely necessary to prevent overproduction. We have used asymmetric and symmetric key encryption, in a fashion similar to Pretty Good Privacy (PGP), to transfer keys from the SoC designer or 3PIP owners to the chips. In addition, we also propose to attach an IP digest (a cryptographic hash of the entire IP) to the header of an IP to prevent modification of the IP by the SoC designers. We have shown that our approach is resistant to various attacks with the cost of minimal area overhead.

URLhttp://doi.acm.org/10.1145/2893183
DOI10.1145/2893183
Citation Keyguin_fortis:_2016