An Orthogonal Algorithm for Key Management in Hardware Obfuscation
Title | An Orthogonal Algorithm for Key Management in Hardware Obfuscation |
Publication Type | Conference Paper |
Year of Publication | 2019 |
Authors | Wang, Jiawei, Zhang, Yuejun, Wang, Pengjun, Luan, Zhicun, Xue, Xiaoyong, Zeng, Xiaoyang, Yu, Qiaoyan |
Conference Name | 2019 Asian Hardware Oriented Security and Trust Symposium (AsianHOST) |
Date Published | Dec. 2019 |
Publisher | IEEE |
ISBN Number | 978-1-7281-3544-1 |
Keywords | authenticate obfuscation keys, composability, copy protection, Hardware, hardware security, industrial property, integrated circuit design, integrated circuits, intellectual property piracy attacks, intellectual property security, IP cores, IP networks, IP piracy, IP piracy attacks, Licenses, member leakage attack, microprocessor chips, orthogonal matrix, Orthogonal obfuscation, orthogonal obfuscation algorithm, partnership organization, policy-based governance, Protocols, pubcrawl, resilience, Resiliency, reverse engineering, security, semiconductor chips, supply chain, supply chain management |
Abstract | The globalization of supply chain makes semiconductor chips susceptible to various security threats. Design obfuscation techniques have been widely investigated to thwart intellectual property (IP) piracy attacks. Key distribution among IP providers, system integration team, and end users remains as a challenging problem. This work proposes an orthogonal obfuscation method, which utilizes an orthogonal matrix to authenticate obfuscation keys, rather than directly examining each activation key. The proposed method hides the keys by using an orthogonal obfuscation algorithm to increasing the key retrieval time, such that the primary keys for IP cores will not be leaked. The simulation results show that the proposed method reduces the key retrieval time by 36.3% over the baseline. The proposed obfuscation methods have been successfully applied to ISCAS'89 benchmark circuits. Experimental results indicate that the orthogonal obfuscation only increases the area by 3.4% and consumes 4.7% more power than the baseline1. |
URL | https://ieeexplore.ieee.org/document/9006703 |
DOI | 10.1109/AsianHOST47458.2019.9006703 |
Citation Key | wang_orthogonal_2019 |
- member leakage attack
- supply chain management
- Supply Chain
- semiconductor chips
- security
- reverse engineering
- Resiliency
- resilience
- pubcrawl
- Protocols
- policy-based governance
- partnership organization
- orthogonal obfuscation algorithm
- Orthogonal obfuscation
- orthogonal matrix
- microprocessor chips
- authenticate obfuscation keys
- Licenses
- IP piracy attacks
- IP piracy
- IP networks
- IP cores
- intellectual property security
- intellectual property piracy attacks
- integrated circuits
- integrated circuit design
- industrial property
- Hardware Security
- Hardware
- copy protection
- composability