Evaluating the Security of eFPGA-based Redaction Algorithms

Hardware IP owners must envision procedures to avoid piracy and overproduction of their designs under a fabless paradigm. A newly proposed technique to obfuscate critical components in a logic design is called eFPGA-based redaction, which replaces a sensitive sub-circuit with an embedded FPGA, and t...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:2022 IEEE/ACM International Conference On Computer Aided Design (ICCAD) S. 1 - 7
Hauptverfasser: Rezaei, Amin, Afsharmazayejani, Raheel, Maynard, Jordan
Format: Tagungsbericht
Sprache:Englisch
Veröffentlicht: ACM 29.10.2022
Schlagworte:
ISSN:1558-2434
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Abstract Hardware IP owners must envision procedures to avoid piracy and overproduction of their designs under a fabless paradigm. A newly proposed technique to obfuscate critical components in a logic design is called eFPGA-based redaction, which replaces a sensitive sub-circuit with an embedded FPGA, and the eFPGA is configured to perform the same functionality as the missing sub-circuit. In this case, the configuration bitstream acts as a hidden key only known to the hardware IP owner. In this paper, we first evaluate the security promise of the existing eFPGA-based redaction algorithms as a preliminary study. Then, we break eFPGA-based redaction schemes by an initial but not necessarily efficient attack named DIP Exclusion that excludes problematic input patterns from checking in a brute-force manner. Finally, by combining cycle breaking and unrolling, we propose a novel and powerful attack called Break & Unroll that is able to recover the bitstream of state-of-the-art eFPGA-based redaction schemes in a relatively short time even with the existence of hard cycles and large size keys. This study reveals that the common perception that eFPGA-based redaction is by default secure against oracle-guided attacks, is prejudice. It also shows that additional research on how to systematically create an exponential number of non-combinational hard cycles is required to secure eFPGA-based redaction schemes.
AbstractList Hardware IP owners must envision procedures to avoid piracy and overproduction of their designs under a fabless paradigm. A newly proposed technique to obfuscate critical components in a logic design is called eFPGA-based redaction, which replaces a sensitive sub-circuit with an embedded FPGA, and the eFPGA is configured to perform the same functionality as the missing sub-circuit. In this case, the configuration bitstream acts as a hidden key only known to the hardware IP owner. In this paper, we first evaluate the security promise of the existing eFPGA-based redaction algorithms as a preliminary study. Then, we break eFPGA-based redaction schemes by an initial but not necessarily efficient attack named DIP Exclusion that excludes problematic input patterns from checking in a brute-force manner. Finally, by combining cycle breaking and unrolling, we propose a novel and powerful attack called Break & Unroll that is able to recover the bitstream of state-of-the-art eFPGA-based redaction schemes in a relatively short time even with the existence of hard cycles and large size keys. This study reveals that the common perception that eFPGA-based redaction is by default secure against oracle-guided attacks, is prejudice. It also shows that additional research on how to systematically create an exponential number of non-combinational hard cycles is required to secure eFPGA-based redaction schemes.
Author Maynard, Jordan
Rezaei, Amin
Afsharmazayejani, Raheel
Author_xml – sequence: 1
  givenname: Amin
  surname: Rezaei
  fullname: Rezaei, Amin
  organization: California State University Long Beach,Long Beach,California,USA
– sequence: 2
  givenname: Raheel
  surname: Afsharmazayejani
  fullname: Afsharmazayejani, Raheel
  organization: University of Calgary,Calgary,Canada
– sequence: 3
  givenname: Jordan
  surname: Maynard
  fullname: Maynard, Jordan
  organization: California State University Long Beach,Long Beach,California,USA
BookMark eNotjktLw0AURkdRsNas3biYP5A67zuDq1DaKhQUH-symdzbRtJEmlTov29AV9_iHA7fLbtquxYZu5diJqWxj9oKr62aaWuCUfaCZQH8CIQOSoK5ZBNprc-V0eaGZX3_LYRQHiSAmLCnxW9sjnGo2y0fdsg_MB0P9XDiHXFcvq2KvIw9Vvwdq5iGumt50Wy70djt-zt2TbHpMfvfKftaLj7nz_n6dfUyL9Z5VMYPeQQwCGUlTBmRQnLJEYGKCZwlU45XHToCnUjqklLwREo7Fbz0AikGPWUPf90aETc_h3ofD6eNFMIFkFqfARXQSbs
ContentType Conference Proceeding
DBID 6IE
6IH
CBEJK
RIE
RIO
DOI 10.1145/3508352.3549425
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Proceedings Order Plan (POP) 1998-present by volume
IEEE Xplore All Conference Proceedings
IEEE Electronic Library (IEL)
IEEE Proceedings Order Plans (POP) 1998-present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISBN 9781450392174
1450392172
EISSN 1558-2434
EndPage 7
ExternalDocumentID 10069713
Genre orig-research
GroupedDBID 6IE
6IF
6IH
6IL
6IN
AAWTH
ABLEC
ADZIZ
ALMA_UNASSIGNED_HOLDINGS
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CBEJK
CHZPO
FEDTE
IEGSK
IJVOP
M43
OCL
RIE
RIL
RIO
ID FETCH-LOGICAL-a248t-a774e7bd04baef9c6c6ff72ac765f4b8146e6f73cf13bfc98ff236298180efa93
IEDL.DBID RIE
ISICitedReferencesCount 16
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000981574300153&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
IngestDate Wed Aug 27 02:46:16 EDT 2025
IsPeerReviewed false
IsScholarly true
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-a248t-a774e7bd04baef9c6c6ff72ac765f4b8146e6f73cf13bfc98ff236298180efa93
PageCount 7
ParticipantIDs ieee_primary_10069713
PublicationCentury 2000
PublicationDate 2022-Oct.-29
PublicationDateYYYYMMDD 2022-10-29
PublicationDate_xml – month: 10
  year: 2022
  text: 2022-Oct.-29
  day: 29
PublicationDecade 2020
PublicationTitle 2022 IEEE/ACM International Conference On Computer Aided Design (ICCAD)
PublicationTitleAbbrev ICCAD
PublicationYear 2022
Publisher ACM
Publisher_xml – name: ACM
SSID ssj0002871770
ssj0020286
Score 2.3287864
Snippet Hardware IP owners must envision procedures to avoid piracy and overproduction of their designs under a fabless paradigm. A newly proposed technique to...
SourceID ieee
SourceType Publisher
StartPage 1
SubjectTerms Cycle Breaking
Cycle Unrolling
eFPGA-based Redaction
Hard Cycles
Logic Locking
Logic Obfuscation
SAT Attack
Title Evaluating the Security of eFPGA-based Redaction Algorithms
URI https://ieeexplore.ieee.org/document/10069713
WOSCitedRecordID wos000981574300153&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1JTwMhFCbaeNCL2xj3cPBKnYWBIZ4a0-rBNI1L0lsDbx7VRGdMF3-_wIy1Fw_eCHAgj-V7PPjeR8hVliJHN7Ms0TEyrkEybbhlxr-ilQUkhQhE4Qc5HBbjsRq1ZPXAhUHE8PkMu74Y3vLLGpY-VOZ2eCyU9Bq1m1LKhqy1Cqh411_6xdfetlyFaHP5JDy_zvLgbHQzdyHiXhh7TUwlYMlg95-j2CPRLyuPjlZ4s082sDogO2sJBQ_JTb9N3l1NqfPs6FOrTkdrS3Ewuusxj1olfcSyITTQ3vu0dj1eP-YReRn0n2_vWSuPwHTKiwXTznNDacqYG41WgQBhrUyduUVuufGxPRRWZmCTzFhQhbWpgyvl2d1otcqOSKeqKzwm1DUZBeDOPVXyQoNxqK4QIQdPtc3jExJ5O0w-mwwYkx8TnP5Rf0a2U08TcGd8qs5JZzFb4gXZgq_F23x2GebtG4ZwmAk
linkProvider IEEE
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LTwMhECammqgXXzW-5eCVusuysMRTY1prrE2jNemtAXaoJrpr-vD3C3StvXjwRoADGR7fMPDNh9BVQoGBm1kSqwgIU0YQpZkl2r-i5ZmJMx6Iwl3R62XDoexXZPXAhQGA8PkMGr4Y3vLz0sx9qMzt8IhL4TVq11PGaLygay1DKt75F375VfctV8GrbD4xS6-TNLgbjcRdiZiXxl6RUwlo0t755zh2Uf2Xl4f7S8TZQ2tQ7KPtlZSCB-imVaXvLsbY-Xb4udKnw6XF0O7fNYnHrRw_Qb6gNODm-7h0PV4_pnX00m4NbjukEkggirJsRpTz3UDoPGJagZWGG26toM7gPLVM--gecCsSY-NEWyMza6kDLOn53WCVTA5RrSgLOELYNWlpjDv5ZM4yZbTDdQlgUuPJtml0jOreDqPPRQ6M0Y8JTv6ov0SbncFjd9S97z2coi3qSQPuxKfyDNVmkzmcow3zNXubTi7CHH4DoeKbUA
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2022+IEEE%2FACM+International+Conference+On+Computer+Aided+Design+%28ICCAD%29&rft.atitle=Evaluating+the+Security+of+eFPGA-based+Redaction+Algorithms&rft.au=Rezaei%2C+Amin&rft.au=Afsharmazayejani%2C+Raheel&rft.au=Maynard%2C+Jordan&rft.date=2022-10-29&rft.pub=ACM&rft.eissn=1558-2434&rft.spage=1&rft.epage=7&rft_id=info:doi/10.1145%2F3508352.3549425&rft.externalDocID=10069713