簡易檢索 / 詳目顯示

研究生: 吉德軒
Ji, De-Xuan
論文名稱: 用於邏輯加密保護的以電路訊號干擾的加密邏輯閘設計
A Glitch Key-Gate for Logic Encryption
指導教授: 王俊堯
Wang, Chun-Yao
口試委員: 溫宏斌
Wen, Hung-Pin
黃俊達
Huang, Juinn-Dar
學位類別: 碩士
Master
系所名稱:
論文出版年: 2018
畢業學年度: 106
語文別: 英文
論文頁數: 32
中文關鍵詞: 硬體安全邏輯加密
外文關鍵詞: Hardware Security, Logic Encryption
相關次數: 點閱:1下載:0
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 邏輯加密是一種用於保護積體電路智慧財產權的技術,只有被授權的使用者擁有密碼來解鎖積體電路的正確功能。近期研究者提出了一種基於可滿足性演算法的有效攻擊方法,稱為SAT attack,此方法能夠成功破解加密的電路設計。為了加強邏輯加密,本論文提出了一種基於電路訊號干擾的邏輯加密方法,並且能夠加密於時序電路。我們所提出的加密邏輯閘的新方法可以產生電路訊號干擾,並且能夠使用上升和下降的訊號轉換作為邏輯加密的密碼。實驗結果呈現出,我們所提出的加密邏輯閘的新方法擁有能夠高比例的嵌入IWLS2005基準電路的能力。對於具有8、16和32個位元的密碼的加密,使用我們提出的加密方法的加密設計中,電路面積所產生的成本分別為原始電路的10.68%、12.22%和26.11%,而當我們結合其他的邏輯加密技術時,成本可以大大減少。


    Logic encryption is a technique used for intellectual property protection. Only authorized users possess keys to unlock the integrated circuits for correct operations. An effective attacking method based on satisfiability (SAT) algorithm, known as SAT attack, was proposed to decrypt an encrypted design successfully. To strengthen logic encryption, this thesis proposes a glitch-based logic encryption method designed for sequential circuits. The proposed new schemes of key-gates can generate glitches, and use rising and falling transitions as key-inputs for the comprehensive logic encryption. Experimental results show that the proposed glitch key-gate (GK) has high capability to be embedded in a set of IWLS2005 Benchmarks. The cell area overhead in the designs encrypted with GKs are 10.68%, 12.22%, and 26.11% on average for encryptions with 8, 16, and 32 key-inputs, respectively, and the overhead can be reduced substantially when we combine other logic encryption methods with our GKs.

    中文摘要 Abstract Acknowledgement Contents List of Tables List of Figures 1 Introduction -----------------------------------------1 2 Glitch Key-gate --------------------------------------6 2.1 Working Mechanism of GK ----------------------------6 2.2 Key Generator for GK -------------------------------8 3 Behavior of Glitches --------------------------------11 4 Timing Constraints and Design Flow ------------------13 4.1 Timing Constraints --------------------------------13 4.2 Design Flow ---------------------------------------17 5 Security Analysis of GK -----------------------------20 5.1 SAT Attack ----------------------------------------20 5.2 Enhanced SAT Attack -------------------------------21 5.3 Removal Attack ------------------------------------21 5.4 Enhanced Removal Attack ---------------------------22 6 Experimental Results --------------------------------24 7 Conclusion ------------------------------------------29

    [1] X. Chen, Q. Liu, Y. Wang, Q. Xu, and H. Yang, “Low-Overhead Implementation of Logic Encryption Using Gate Replacement Techniques,” in Proc. of 18th International Symposium on Quality Electronic Design, 2017.
    [2] C.-H. Chou, H.-H. Yeh, S.-H. Huang, Y.-T. Nieh, S.-C. Chang, and Y.-T. Chang, “Skew Minimization With Low Power for Wide-Voltage-Range Multipower-Mode Designs,” IEEE Trans. on Very Large Scale Integration Systems, vol.24, no. 3, pp. 1189-1192, 2016.
    [3] G. K. Contreras, M. T. Rahman, and M. Tehranipoor, “Secure Split-Test for Preventing IC Piracy by Untrusted Foundry and Assembly,” in Proc. of IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems, 2013.
    [4] S.-Y. Ho, S.-R. Lin, K.-L. Yuan, C.-Y. Kuo, K.-Y. Liao, J.-H. R. Jiang, and C.-M. Li, “Automatic Test Pattern Generation for Delay Defects Using Timed Characteristic Functions,” in Proc. of IEEE/ACM International Conference on Computer Aided Design, 2013.
    [5] R. Karmakar, S. Chatopadhyay, and R. Kapur, “Encrypt Flip-Flop: A Novel Logic Encryption Technique For Sequential Circuits,” arXiv:1801.04961 [cs.CR], 2018.
    [6] S. Khaleghi, K. D. Zhao, and W. Rao, “IC piracy prevention via design withholding and entanglement,” in Proc. of 20th Asia and South Pacific Design Automation Conference, 2015.
    [7] B. Liu, and B. Wang, “Embedded Reconfigurable Logic for ASIC Design Obfuscation Against Supply Chain Attacks,” in Proc. of Design, Automation and Test in Europe Conference and Exhibition, 2014.
    [8] J. Rajendran, H. Zhang, C. Zhang, G. S. Rose, Y Pino, O. Sinanoglu, and R. Karri, “Fault Analysis-Based Logic Encryption,” IEEE Trans. on Computers, vol. 64, no. 2, pp. 410-424, 2013.
    [9] M. Rostami, F. Koushanfar, and R. Karri, “A Primer on Hardware Security: Models, Methods, and Metrics,” in Proc. of the IEEE, vol. 10, no. 8, pp. 1283-1295, 2014.
    [10] J. A. Roy, F. Koushanfar, and I. L. Markov, “Protecting Bus-based Hardware IP by Secret Sharing,” in Proc. of 45th ACM/IEEE Design Automation Conference, 2008.
    [11] J. A. Roy, F. Koushanfar, and I. L. Markov, “Ending Piracy of Integrated Circuits,” Computer, vol. 43, no. 10, pp. 30-38, 2010.
    [12] K. Shamsi, M. Li, T. Meade, Z. Zhao, David Z. Pan, and Yier Jin, “AppSAT: Approximately Deobfuscating Integrated Circuits,” in Proc. of IEEE International Symposium on Hardware Oriented Security Trust, 2017.
    [13] P. Subramanyan, S. Ray, S. Malik, “Evaluating the Security of Logic Encryption Algorithms,” in Proc. of IEEE International Symposium on Hardware Oriented Security Trust, 2015.
    [14] Y. Xie, and A. Srivastava, “Delay Locking: Security Enhancement of Logic Locking against IC Counterfeiting and Overproduction,” In Proc. of 54th ACM/EDAC/IEEE Design Automation Conference, 2017.
    [15] Y. Xie, and A. Srivastava, “Mitigating SAT Attack on Logic Locking,” in Proc. of International Conference on Cryptographic Hardware and Embedded Systems, 2016.
    [16] M. Yasin, B. Mazumdar, J. J V Rajendran, and O. Sinanoglu, “SARlock: SAT Attack Resistant Logic Locking,” in Proc. of IEEE International Symposium on Hardware Oriented Security Trust, 2016.
    [17] M. Yasin, B. Mazumdar, O. Sinanoglu, and J. Rajendran, “Security Analysis of Anti-SAT,” in Proc. of 22nd Asia and South Pacific Design Automation Conference, 2016.
    [18] M. Yasin, B. Mazumdar, O. Sinanoglu, and J. Rajendran, “Removal Attacks on Logic Locking and Camouflaging Techniques,” IEEE Trans. on Emerging Topics in Computing, 2017.
    [19] J. Zhang, “A Practical Logic Obfuscation Technique for Hardware Security,”IEEE Trans. on Very Large Scale Integration Systems, vol. 24, no. 3, pp. 1193-1197, 2015.
    [20] (April 20, 2018). Synopsys Design Compiler. [Online]. Available: https://www.synopsys.com
    [21] (April 20, 2018). Synopsys IC Compiler. [Online]. Available: https://www.synopsys.com
    [22] (April 20, 2018). Synopsys PrimeTime. [Online]. Available: https://www.synopsys.com
    [23] (April 20, 2018). Synopsys Verdi. [Online]. Available: http://www.synopsys.com
    [24] (April 20, 2018). IWLS2005 Benchmarks. [Online]. Available: http://iwls.org/iwls2005/benchmarks.html

    QR CODE