Skip to main content

Obfuscated Built-In Self-authentication

  • Chapter
  • First Online:
Hardware Protection through Obfuscation

Abstract

Hardware trojan insertion and intellectual property (IP) theft are two major concerns when dealing with untrusted foundries. Most obfuscation techniques have a limited capability of addressing both vulnerabilities. Split manufacturing is designed to stop IP piracy and IC cloning, but it cannot deal with untargeted hardware Trojan insertion. Also, there are significant overheads involved with getting the highest level of protection from split manufacturing. Built-in self-authentication (BISA ) is a low-cost technique for preventing and detecting hardware Trojan insertion, but is vulnerable to IP piracy , IC cloning, or redesign attacks, especially on original circuitry. By combining BISA with split manufacturing, it is not only possible to defeat these attacks, but also strengthen protections and lower the cost of split manufacturing as well. The resulting combined technique is called obfuscated BISA (OBISA ). In this chapter, the reader can expect to learn: (1) backgrounds on BISA as well as its existing problems and weakness; (2) two separate approaches for OBISA, based on the trade-offs between security and computational/fabrication costs involved; (3) implementation flow for both approaches; and (4) their design issues, trade-offs, and potential attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 89.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 119.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Guin U, Forte D, Tehranipoor M (2013) Anti-counterfeit techniques: from design to resign. In: 14th international workshop on microprocessor test and verification, pp 89–94. IEEE

    Google Scholar 

  2. Tehranipoor MM, Guin U, Forte D (2015) Counterfeit integrated circuits. Springer, Switzerland, pp 15–36

    Google Scholar 

  3. Guin U, Shi Q, Forte D, Tehranipoor MM (2016) Fortis: a comprehensive solution for establishing forward trust for protecting ips and ics. ACM Trans Des Autom Electron Syst (TODAES) 21(4):63

    Google Scholar 

  4. Guin U (2016) Establishment of trust and integrity in modern supply chain from design to resign

    Google Scholar 

  5. Xiao K (2015) Techniques for improving security and trustworthiness of integrated circuits

    Google Scholar 

  6. IARPA Trusted Integrated Circuits (TIC) program announcement. http://www.fbo.gov

  7. Salmani H, Tehranipoor M, Plusquellic J (2012) A novel technique for improving hardware trojan detection and reducing trojan activation time. IEEE Trans Very Large Scale Integr (VLSI) Syst 20(1):112–125

    Article  Google Scholar 

  8. Li J, Lach J (2008) At-speed delay characterization for ic authentication and trojan horse detection. In: IEEE international workshop on hardware-oriented security and trust, 2008. HOST 2008. IEEE, pp 8–14

    Google Scholar 

  9. Jin Y, Kupp N, Makris Y (2010) Dftt: design for trojan test. In: 2010 17th IEEE international conference on electronics, circuits, and systems (ICECS). IEEE, pp 1168–1171

    Google Scholar 

  10. Rajendran J, Jyothi V, Sinanoglu O, Karri R (2011) Design and analysis of ring oscillator based design-for-trust technique. In: 29th VLSI Test Symposium. IEEE, pp 105–110

    Google Scholar 

  11. Salmani H, Tehranipoor M (2012) Layout-aware switching activity localization to enhance hardware trojan detection. IEEE Trans Inf Forensics Secur 7(1):76–87

    Article  Google Scholar 

  12. Chakraborty RS, Bhunia S (2009) Security against hardware trojan through a novel application of design obfuscation. In: Proceedings of the 2009 international conference on computer-aided design. ACM, pp 113–116

    Google Scholar 

  13. Banga M, Hsiao MS (2011) Odette: a non-scan design-for-test methodology for trojan detection in ics. In: 2011 IEEE international symposium on hardware-oriented security and trust (HOST). IEEE, pp 18–23

    Google Scholar 

  14. Chakraborty RS, Bhunia S (2009) Harpoon: an obfuscation-based soc design methodology for hardware protection. IEEE Trans Comput Aided Des Integr Circ Syst 28(10):1493–1502

    Article  Google Scholar 

  15. Rajendran J, Pino Y, Sinanoglu O, Karri R (2012) Security analysis of logic obfuscation. In: Proceedings of the 49th annual design automation conference. ACM, pp 83–89

    Google Scholar 

  16. Yang X, Choi B-K, Sarrafzadeh M (2003) Routability-driven white space allocation for fixed-die standard-cell placement. IEEE Trans Comput Aided Des Integr Circ Syst 22(4):410–419

    Article  Google Scholar 

  17. Charlebois S, Dunn P, Rohrbaugh G (2008) Method of optimizing customizable filler cells in an integrated circuit physical design process, 28 October 2008, uS Patent 7,444,609. https://www.google.com/patents/US7444609

  18. Xiao K, Forte D, Tehranipoor MM (2015) Efficient and secure split manufacturing via obfuscated built-in self-authentication. In: 2015 IEEE international symposium on hardware oriented security and trust (HOST). IEEE, pp 14–19

    Google Scholar 

  19. Xiao K, Forte D, Jin Y, Karri R, Bhunia S, Tehranipoor M (2016) Hardware trojans: lessons learned after one decade of research. ACM Trans Des Autom Electron Syst 22(1):6:1–6:23. http://doi.acm.org/10.1145/2906147

  20. Shi Q, Tehranipoor M, Wang X, Winemberg L (2014) On-chip sensor selection for effective speed-binning. In: 2014 IEEE 57th international midwest symposium on circuits and systems (MWSCAS). IEEE, pp 1073–1076

    Google Scholar 

  21. Turk RJ et al (2005) Cyber incidents involving control systems. Idaho National Engineering and Environmental Laboratory

    Google Scholar 

  22. Imeson F, Emtenan A, Garg S, Tripunitara M (2013) Securing computer hardware using 3d integrated circuit (ic) technology and split manufacturing for obfuscation. In: Presented as part of the 22nd USENIX security symposium (USENIX Security 13), pp 495–510

    Google Scholar 

  23. Jagasivamani M, Gadfort P, Sika M, Bajura M, Fritze M (2014) Split-fabrication obfuscation: metrics and techniques. In: 2014 IEEE international symposium on hardware-oriented security and trust (HOST). IEEE, pp 7–12

    Google Scholar 

  24. Xiao K, Forte D, Tehranipoor M (2014) A novel built-in self-authentication technique to prevent inserting hardware trojans. IEEE Trans Comput Aided Des Integr Circ Syst 33(12):1778–1791

    Article  Google Scholar 

  25. Bushnell M, Agrawal VD (2000) Essentials of electronic testing for digital, memory and mixed-signal VLSI circuits, vol 17. Springer Science & Business Media, New York

    Google Scholar 

  26. Jha S, Jha SK (2008) Randomization based probabilistic approach to detect trojan circuits. In: 11th IEEE high assurance systems engineering symposium, 2008. HASE 2008. IEEE, pp 117–124

    Google Scholar 

  27. Wang X, Tehranipoor M, Plusquellic J (2008) Detecting malicious inclusions in secure hardware: challenges and solutions. In: IEEE international workshop on hardware-oriented security and trust, 2008. HOST 2008. IEEE, pp 15–19

    Google Scholar 

  28. Agrawal D, Baktir S, Karakoyunlu D, Rohatgi P, Sunar B (2007) Trojan detection using ic fingerprinting. In: 2007 IEEE symposium on security and privacy (SP’07). IEEE, pp 296–310

    Google Scholar 

  29. Narasimhan S, Wang X, Du D, Chakraborty RS, Bhunia S (2011) Tesr: a robust temporal self-referencing approach for hardware trojan detection. In: 2011 IEEE international symposium on hardware-oriented security and trust (HOST). IEEE, pp 71–74

    Google Scholar 

  30. Zhang J, Yu H, Xu Q (2012) Htoutlier: hardware trojan detection with side-channel signature outlier identification. In: 2012 IEEE international symposium on hardware-oriented security and trust (HOST). IEEE, pp 55–58

    Google Scholar 

  31. Wei S, Meguerdichian S, Potkonjak M (2010) Gate-level characterization: foundations and hardware security applications. In: Proceedings of the 47th design automation conference. ACM, pp 222–227

    Google Scholar 

  32. Aarestad J, Acharyya D, Rad R, Plusquellic J (2010) Detecting trojans through leakage current analysis using multiple supply pad s. IEEE Trans Inf Forensics Secur 5(4):893–904

    Article  Google Scholar 

  33. Alkabani Y, Koushanfar F (2009) Consistency-based characterization for ic trojan detection. In: Proceedings of the 2009 international conference on computer-aided design. ACM, pp 123–127

    Google Scholar 

  34. Jin Y, Makris Y (2008) Hardware trojan detection using path delay fingerprint. In: IEEE international workshop on hardware-oriented security and trust, 2008. HOST 2008. IEEE, pp 51–57

    Google Scholar 

  35. Xiao K, Zhang X, Tehranipoor M (2013) A clock sweeping technique for detecting hardware trojans impacting circuits delay. IEEE Des Test 30(2):26–34

    Article  Google Scholar 

  36. Cha B, Gupta SK (2013) Trojan detection via delay measurements: a new approach to select paths and vectors to maximize effectiveness and minimize cost. In: Design, automation & test in Europe conference & exhibition (DATE). IEEE, pp 1265–1270

    Google Scholar 

  37. Rajendran JJ, Sinanoglu O, Karri R (2013) Is split manufacturing secure? In: Proceedings of the conference on design, automation and test in Europe. EDA Consortium, 2013, pp 1259–1264

    Google Scholar 

  38. Xiao K, Tehranipoor M (2013) Bisa: built-in self-authentication for preventing hardware trojan insertion. In: 2013 IEEE international symposium on hardware-oriented security and trust (HOST). IEEE, pp 45–50

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Qihang Shi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this chapter

Cite this chapter

Shi, Q., Xiao, K., Forte, D., Tehranipoor, M.M. (2017). Obfuscated Built-In Self-authentication. In: Forte, D., Bhunia, S., Tehranipoor, M. (eds) Hardware Protection through Obfuscation. Springer, Cham. https://doi.org/10.1007/978-3-319-49019-9_11

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-49019-9_11

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-49018-2

  • Online ISBN: 978-3-319-49019-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics