2018 55th ACM/ESDA/IEEE Design Automation Conference (DAC) 2018
DOI: 10.1109/dac.2018.8465830
|View full text |Cite
|
Sign up to set email alerts
|

TAO: Techniques for Algorithm-Level Obfuscation during High-Level Synthesis

Abstract: Intellectual Property (IP) theft costs semiconductor design companies billions of dollars every year. Unauthorized IP copies start from reverse engineering the given chip. Existing techniques to protect against IP theft aim to hide the IC's functionality, but focus on manipulating the HDL descriptions. We propose TAO as a comprehensive solution based on high-level synthesis to raise the abstraction level and apply algorithmic obfuscation automatically. TAO includes several transformations that make the compone… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
42
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
5
3

Relationship

3
5

Authors

Journals

citations
Cited by 34 publications
(42 citation statements)
references
References 14 publications
0
42
0
Order By: Relevance
“…Our next steps are: • validate ASSURE on larger designs and with more structural and functional metrics and attacks. We plan to use a red team-blue team approach to create a virtuous cycle of attacks and defenses [5,9]. • include more obfuscation techniques, borrowing concepts from software obfuscation, and methods to automatically select which portions of the design to obfuscate with limited key bitstream budgets and/or overhead constraints.…”
Section: Discussion and Future Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Our next steps are: • validate ASSURE on larger designs and with more structural and functional metrics and attacks. We plan to use a red team-blue team approach to create a virtuous cycle of attacks and defenses [5,9]. • include more obfuscation techniques, borrowing concepts from software obfuscation, and methods to automatically select which portions of the design to obfuscate with limited key bitstream budgets and/or overhead constraints.…”
Section: Discussion and Future Workmentioning
confidence: 99%
“…However, integrating security protections must fit into the existing/established industrial design flows to avoid compromising the time-to-market and quality of the final ICs without affecting the security guarantees. For example, high-level obfuscation can be performed during highlevel synthesis but requires custom tools [5].…”
Section: Rtl Obfuscation Of Semantics Of Ipmentioning
confidence: 99%
“…Let C be the input C code to synthesize. To create unique features unknown to the attacker, we borrow the idea of C-based obfuscation [9], [16]. We identify a set T of C-level transformations with parameters known only to the design house.…”
Section: Proposed Approachmentioning
confidence: 99%
“…We transform the input C code with key-based control flow splitting, already used for obfuscating software code [17] and logic locking [16]. After parsing, we list all eligible basic blocks, excluding the ones with multiple exit branches.…”
Section: Ip Birthmarking Creationmentioning
confidence: 99%
“…In [7] and [8], high-level transformations are used to protect digital signal processing (DSP) circuits. In [9] and [10], keybased obfuscation is added during HLS by extending the HLS process. In these works, the goal is to obtain obfuscated RTL and to provide protection during manufacturing or for thirdparty vendors of IPs, and HLS is considered to be a trusted design step.…”
Section: A Ip Protectionmentioning
confidence: 99%