Evaluating the Security of eFPGA-based Redaction Algorithms
Hardware IP owners must envision procedures to avoid piracy and overproduction of their designs under a fabless paradigm. A newly proposed technique to obfuscate critical components in a logic design is called eFPGA-based redaction, which replaces a sensitive sub-circuit with an embedded FPGA, and t...
Gespeichert in:
| Veröffentlicht in: | 2022 IEEE/ACM International Conference On Computer Aided Design (ICCAD) S. 1 - 7 |
|---|---|
| Hauptverfasser: | , , |
| Format: | Tagungsbericht |
| Sprache: | Englisch |
| Veröffentlicht: |
ACM
29.10.2022
|
| Schlagworte: | |
| ISSN: | 1558-2434 |
| Online-Zugang: | Volltext |
| Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
| Abstract | Hardware IP owners must envision procedures to avoid piracy and overproduction of their designs under a fabless paradigm. A newly proposed technique to obfuscate critical components in a logic design is called eFPGA-based redaction, which replaces a sensitive sub-circuit with an embedded FPGA, and the eFPGA is configured to perform the same functionality as the missing sub-circuit. In this case, the configuration bitstream acts as a hidden key only known to the hardware IP owner. In this paper, we first evaluate the security promise of the existing eFPGA-based redaction algorithms as a preliminary study. Then, we break eFPGA-based redaction schemes by an initial but not necessarily efficient attack named DIP Exclusion that excludes problematic input patterns from checking in a brute-force manner. Finally, by combining cycle breaking and unrolling, we propose a novel and powerful attack called Break & Unroll that is able to recover the bitstream of state-of-the-art eFPGA-based redaction schemes in a relatively short time even with the existence of hard cycles and large size keys. This study reveals that the common perception that eFPGA-based redaction is by default secure against oracle-guided attacks, is prejudice. It also shows that additional research on how to systematically create an exponential number of non-combinational hard cycles is required to secure eFPGA-based redaction schemes. |
|---|---|
| AbstractList | Hardware IP owners must envision procedures to avoid piracy and overproduction of their designs under a fabless paradigm. A newly proposed technique to obfuscate critical components in a logic design is called eFPGA-based redaction, which replaces a sensitive sub-circuit with an embedded FPGA, and the eFPGA is configured to perform the same functionality as the missing sub-circuit. In this case, the configuration bitstream acts as a hidden key only known to the hardware IP owner. In this paper, we first evaluate the security promise of the existing eFPGA-based redaction algorithms as a preliminary study. Then, we break eFPGA-based redaction schemes by an initial but not necessarily efficient attack named DIP Exclusion that excludes problematic input patterns from checking in a brute-force manner. Finally, by combining cycle breaking and unrolling, we propose a novel and powerful attack called Break & Unroll that is able to recover the bitstream of state-of-the-art eFPGA-based redaction schemes in a relatively short time even with the existence of hard cycles and large size keys. This study reveals that the common perception that eFPGA-based redaction is by default secure against oracle-guided attacks, is prejudice. It also shows that additional research on how to systematically create an exponential number of non-combinational hard cycles is required to secure eFPGA-based redaction schemes. |
| Author | Maynard, Jordan Rezaei, Amin Afsharmazayejani, Raheel |
| Author_xml | – sequence: 1 givenname: Amin surname: Rezaei fullname: Rezaei, Amin organization: California State University Long Beach,Long Beach,California,USA – sequence: 2 givenname: Raheel surname: Afsharmazayejani fullname: Afsharmazayejani, Raheel organization: University of Calgary,Calgary,Canada – sequence: 3 givenname: Jordan surname: Maynard fullname: Maynard, Jordan organization: California State University Long Beach,Long Beach,California,USA |
| BookMark | eNotjktLw0AURkdRsNas3biYP5A67zuDq1DaKhQUH-symdzbRtJEmlTov29AV9_iHA7fLbtquxYZu5diJqWxj9oKr62aaWuCUfaCZQH8CIQOSoK5ZBNprc-V0eaGZX3_LYRQHiSAmLCnxW9sjnGo2y0fdsg_MB0P9XDiHXFcvq2KvIw9Vvwdq5iGumt50Wy70djt-zt2TbHpMfvfKftaLj7nz_n6dfUyL9Z5VMYPeQQwCGUlTBmRQnLJEYGKCZwlU45XHToCnUjqklLwREo7Fbz0AikGPWUPf90aETc_h3ofD6eNFMIFkFqfARXQSbs |
| ContentType | Conference Proceeding |
| DBID | 6IE 6IH CBEJK RIE RIO |
| DOI | 10.1145/3508352.3549425 |
| DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Proceedings Order Plan (POP) 1998-present by volume IEEE Xplore All Conference Proceedings IEEE Electronic Library (IEL) IEEE Proceedings Order Plans (POP) 1998-present |
| DatabaseTitleList | |
| Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://ieeexplore.ieee.org/ sourceTypes: Publisher |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering |
| EISBN | 9781450392174 1450392172 |
| EISSN | 1558-2434 |
| EndPage | 7 |
| ExternalDocumentID | 10069713 |
| Genre | orig-research |
| GroupedDBID | 6IE 6IF 6IH 6IL 6IN AAWTH ABLEC ADZIZ ALMA_UNASSIGNED_HOLDINGS BEFXN BFFAM BGNUA BKEBE BPEOZ CBEJK CHZPO FEDTE IEGSK IJVOP M43 OCL RIE RIL RIO |
| ID | FETCH-LOGICAL-a248t-a774e7bd04baef9c6c6ff72ac765f4b8146e6f73cf13bfc98ff236298180efa93 |
| IEDL.DBID | RIE |
| ISICitedReferencesCount | 16 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000981574300153&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| IngestDate | Wed Aug 27 02:46:16 EDT 2025 |
| IsPeerReviewed | false |
| IsScholarly | true |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-a248t-a774e7bd04baef9c6c6ff72ac765f4b8146e6f73cf13bfc98ff236298180efa93 |
| PageCount | 7 |
| ParticipantIDs | ieee_primary_10069713 |
| PublicationCentury | 2000 |
| PublicationDate | 2022-Oct.-29 |
| PublicationDateYYYYMMDD | 2022-10-29 |
| PublicationDate_xml | – month: 10 year: 2022 text: 2022-Oct.-29 day: 29 |
| PublicationDecade | 2020 |
| PublicationTitle | 2022 IEEE/ACM International Conference On Computer Aided Design (ICCAD) |
| PublicationTitleAbbrev | ICCAD |
| PublicationYear | 2022 |
| Publisher | ACM |
| Publisher_xml | – name: ACM |
| SSID | ssj0002871770 ssj0020286 |
| Score | 2.3287864 |
| Snippet | Hardware IP owners must envision procedures to avoid piracy and overproduction of their designs under a fabless paradigm. A newly proposed technique to... |
| SourceID | ieee |
| SourceType | Publisher |
| StartPage | 1 |
| SubjectTerms | Cycle Breaking Cycle Unrolling eFPGA-based Redaction Hard Cycles Logic Locking Logic Obfuscation SAT Attack |
| Title | Evaluating the Security of eFPGA-based Redaction Algorithms |
| URI | https://ieeexplore.ieee.org/document/10069713 |
| WOSCitedRecordID | wos000981574300153&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1JTwMhFCbaeNCL2xj3cPBKnYWBIZ4a0-rBNI1L0lsDbx7VRGdMF3-_wIy1Fw_eCHAgj-V7PPjeR8hVliJHN7Ms0TEyrkEybbhlxr-ilQUkhQhE4Qc5HBbjsRq1ZPXAhUHE8PkMu74Y3vLLGpY-VOZ2eCyU9Bq1m1LKhqy1Cqh411_6xdfetlyFaHP5JDy_zvLgbHQzdyHiXhh7TUwlYMlg95-j2CPRLyuPjlZ4s082sDogO2sJBQ_JTb9N3l1NqfPs6FOrTkdrS3Ewuusxj1olfcSyITTQ3vu0dj1eP-YReRn0n2_vWSuPwHTKiwXTznNDacqYG41WgQBhrUyduUVuufGxPRRWZmCTzFhQhbWpgyvl2d1otcqOSKeqKzwm1DUZBeDOPVXyQoNxqK4QIQdPtc3jExJ5O0w-mwwYkx8TnP5Rf0a2U08TcGd8qs5JZzFb4gXZgq_F23x2GebtG4ZwmAk |
| linkProvider | IEEE |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LTwMhECammqgXXzW-5eCVusuysMRTY1prrE2jNemtAXaoJrpr-vD3C3StvXjwRoADGR7fMPDNh9BVQoGBm1kSqwgIU0YQpZkl2r-i5ZmJMx6Iwl3R62XDoexXZPXAhQGA8PkMGr4Y3vLz0sx9qMzt8IhL4TVq11PGaLygay1DKt75F375VfctV8GrbD4xS6-TNLgbjcRdiZiXxl6RUwlo0t755zh2Uf2Xl4f7S8TZQ2tQ7KPtlZSCB-imVaXvLsbY-Xb4udKnw6XF0O7fNYnHrRw_Qb6gNODm-7h0PV4_pnX00m4NbjukEkggirJsRpTz3UDoPGJagZWGG26toM7gPLVM--gecCsSY-NEWyMza6kDLOn53WCVTA5RrSgLOELYNWlpjDv5ZM4yZbTDdQlgUuPJtml0jOreDqPPRQ6M0Y8JTv6ov0SbncFjd9S97z2coi3qSQPuxKfyDNVmkzmcow3zNXubTi7CHH4DoeKbUA |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2022+IEEE%2FACM+International+Conference+On+Computer+Aided+Design+%28ICCAD%29&rft.atitle=Evaluating+the+Security+of+eFPGA-based+Redaction+Algorithms&rft.au=Rezaei%2C+Amin&rft.au=Afsharmazayejani%2C+Raheel&rft.au=Maynard%2C+Jordan&rft.date=2022-10-29&rft.pub=ACM&rft.eissn=1558-2434&rft.spage=1&rft.epage=7&rft_id=info:doi/10.1145%2F3508352.3549425&rft.externalDocID=10069713 |