DocumentCode :
631378
Title :
Structural transformation for best-possible obfuscation of sequential circuits
Author :
Li Li ; Hai Zhou
Author_Institution :
Dept. of Electr. Eng. & Comput. Sci., Northwestern Univ., Evanston, IL, USA
fYear :
2013
fDate :
2-3 June 2013
Firstpage :
55
Lastpage :
60
Abstract :
Obfuscation is a technique that makes comprehending a design difficult and hides the secrets in the design. An obfuscation is called best-possible if the obfuscated design leaks no more information than any other design of the same function. In this paper, we prove that any best-possible obfuscation of a sequential circuit can be accomplished by a sequence of four operations: retiming, resynthesis, sweep, and conditional stuttering. Based on this fundamental result, we also develop a key-based obfuscation scheme to protect design Intellectual Properties (IPs) against piracy. The novel obfuscation method embeds a secret key in the power-up state of IC, which is only known by the IP rights owner. Without the key, the IC still functions but its efficiency will be much degraded. Unlike existing IC metering techniques, the secret key in our approach is implicit thus it can also be used as a hidden watermark. Potential attacks and the countermeasures are thoroughly examined, and experimental results demonstrate the effectiveness of the method.
Keywords :
logic design; sequential circuits; IC metering techniques; IP rights; hidden watermark; intellectual properties; key-based obfuscation scheme; obfuscated design; sequential circuit best-possible obfuscation; structural transformation; Hardware; IP networks; Integrated circuits; Registers; Sequential circuits; Watermarking;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Hardware-Oriented Security and Trust (HOST), 2013 IEEE International Symposium on
Conference_Location :
Austin, TX
Print_ISBN :
978-1-4799-0559-1
Type :
conf
DOI :
10.1109/HST.2013.6581566
Filename :
6581566
Link To Document :
بازگشت