PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The...
Transcript of PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The...
![Page 1: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and](https://reader035.fdocuments.net/reader035/viewer/2022071015/5fce25d6b3b59157fe1f00ae/html5/thumbnails/1.jpg)
PhD defense—
Methods for protecting intellectual propertyof IP core designers
Brice Colombier
Univ Lyon, UJM-Saint-Etienne, CNRSLaboratoire Hubert Curien UMR 5516F-42023, SAINT-ETIENNE, France
October 19th, 2017
![Page 2: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and](https://reader035.fdocuments.net/reader035/viewer/2022071015/5fce25d6b3b59157fe1f00ae/html5/thumbnails/2.jpg)
Semiconductor industry:current situation and issues
![Page 3: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and](https://reader035.fdocuments.net/reader035/viewer/2022071015/5fce25d6b3b59157fe1f00ae/html5/thumbnails/3.jpg)
Current situation 2/51
The semiconductor market is highly competitive, must handleincreasing design complexity andmarket pull by customers.
In last two years: sales of almost $340 billion a year [1], front-end investment for manufacturing plants reaches tens of
billion dollars [2], merger and acquisitionsmade headlines (NXP by Qualcomm,
Altera by Intel, etc) and reached almost $100 billion a year [3].
Main shift
Transition from industrial economy to knowledge economy
[1] World Semiconductor Trade Statistics “Global Semiconductor Sales Reach $339 Billion in2016”[2] EETimes “Samsung Breaks Ground on $14 Billion Fab”[3] IC Insights “2015-2016 deals dominate semiconductor M&A ranking”
![Page 4: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and](https://reader035.fdocuments.net/reader035/viewer/2022071015/5fce25d6b3b59157fe1f00ae/html5/thumbnails/4.jpg)
Current situation 2/51
The semiconductor market is highly competitive, must handleincreasing design complexity andmarket pull by customers.
In last two years: sales of almost $340 billion a year [1], front-end investment for manufacturing plants reaches tens of
billion dollars [2], merger and acquisitionsmade headlines (NXP by Qualcomm,
Altera by Intel, etc) and reached almost $100 billion a year [3].
Main shift
Transition from industrial economy to knowledge economy
[1] World Semiconductor Trade Statistics “Global Semiconductor Sales Reach $339 Billion in2016”[2] EETimes “Samsung Breaks Ground on $14 Billion Fab”[3] IC Insights “2015-2016 deals dominate semiconductor M&A ranking”
![Page 5: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and](https://reader035.fdocuments.net/reader035/viewer/2022071015/5fce25d6b3b59157fe1f00ae/html5/thumbnails/5.jpg)
Semiconductor industry in 1960’s: an industrial economy 3/51
Integrated devicemanufacturer(e.g. Intel)
Fabless designer(e.g. Xilinx)
Foundry(e.g. TSMC)
IP coredesigner(e.g. ARM)
Systemintegrator
![Page 6: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and](https://reader035.fdocuments.net/reader035/viewer/2022071015/5fce25d6b3b59157fe1f00ae/html5/thumbnails/6.jpg)
Semiconductor industry in 1980’s: an economy in transition 3/51
Integrated devicemanufacturer(e.g. Intel)
Fabless designer(e.g. Xilinx)
Foundry(e.g. TSMC)
IP coredesigner(e.g. ARM)
Systemintegrator
![Page 7: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and](https://reader035.fdocuments.net/reader035/viewer/2022071015/5fce25d6b3b59157fe1f00ae/html5/thumbnails/7.jpg)
Semiconductor industry in 2000’s: a knowledge economy 3/51
Integrated devicemanufacturer(e.g. Intel)
Fabless designer(e.g. Xilinx)
Foundry(e.g. TSMC)
IP coredesigner(e.g. ARM)
Systemintegrator
![Page 8: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and](https://reader035.fdocuments.net/reader035/viewer/2022071015/5fce25d6b3b59157fe1f00ae/html5/thumbnails/8.jpg)
Semiconductor industry in 2000’s: a knowledge economy 3/51
Integrated devicemanufacturer(e.g. Intel)
Fabless designer(e.g. Xilinx)
Foundry(e.g. TSMC)
IP coredesigner(e.g. ARM)
Systemintegrator
![Page 9: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and](https://reader035.fdocuments.net/reader035/viewer/2022071015/5fce25d6b3b59157fe1f00ae/html5/thumbnails/9.jpg)
Asymmetric design knowledge transfer 4/51
The IP core designermust give away all theintellectual property to the system integrator.
Main issue
The designer cannot know how manytimes the IP core has been instantiated.
This asymmetric design transfer: inhibits fine-grained licensing schemes, prevents proper billing, leads to many cases of illegal copying.
IP coredesigner(e.g. ARM)
Systemintegrator
![Page 10: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and](https://reader035.fdocuments.net/reader035/viewer/2022071015/5fce25d6b3b59157fe1f00ae/html5/thumbnails/10.jpg)
Asymmetric design knowledge transfer 4/51
The IP core designermust give away all theintellectual property to the system integrator.
Main issue
The designer cannot know how manytimes the IP core has been instantiated.
This asymmetric design transfer: inhibits fine-grained licensing schemes, prevents proper billing, leads to many cases of illegal copying.
IP coredesigner(e.g. ARM)
Systemintegrator
![Page 11: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and](https://reader035.fdocuments.net/reader035/viewer/2022071015/5fce25d6b3b59157fe1f00ae/html5/thumbnails/11.jpg)
Threat model and objective
![Page 12: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and](https://reader035.fdocuments.net/reader035/viewer/2022071015/5fce25d6b3b59157fe1f00ae/html5/thumbnails/12.jpg)
Threat model 5/51
Attacker(System integrator)
Objective
Instantiate the IP corewithout the consentof the IP core designer.
Capabilities
Can obtain a legitimatecopy of the IP core,
Has all the technicalresources to instantiatethe IP core correctly.
Defender(IP core designer)
Objectives
Prevent under-reportingof IP core instances,
Make illegal copiesunusable.
Constraint Keep the overall cost
inferior to the financiallosses on illegal copying.
![Page 13: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and](https://reader035.fdocuments.net/reader035/viewer/2022071015/5fce25d6b3b59157fe1f00ae/html5/thumbnails/13.jpg)
Threat model 5/51
Attacker(System integrator)
Objective
Instantiate the IP corewithout the consentof the IP core designer.
Capabilities
Can obtain a legitimatecopy of the IP core,
Has all the technicalresources to instantiatethe IP core correctly.
Defender(IP core designer)
Objectives
Prevent under-reportingof IP core instances,
Make illegal copiesunusable.
Constraint Keep the overall cost
inferior to the financiallosses on illegal copying.
![Page 14: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and](https://reader035.fdocuments.net/reader035/viewer/2022071015/5fce25d6b3b59157fe1f00ae/html5/thumbnails/14.jpg)
Threat model 5/51
Attacker(System integrator)
Objective
Instantiate the IP corewithout the consentof the IP core designer.
Capabilities
Can obtain a legitimatecopy of the IP core,
Has all the technicalresources to instantiatethe IP core correctly.
Defender(IP core designer)
Objectives
Prevent under-reportingof IP core instances,
Make illegal copiesunusable.
Constraint Keep the overall cost
inferior to the financiallosses on illegal copying.
![Page 15: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and](https://reader035.fdocuments.net/reader035/viewer/2022071015/5fce25d6b3b59157fe1f00ae/html5/thumbnails/15.jpg)
Threat model 5/51
Attacker(System integrator)
Objective
Instantiate the IP corewithout the consentof the IP core designer.
Capabilities
Can obtain a legitimatecopy of the IP core,
Has all the technicalresources to instantiatethe IP core correctly.
Defender(IP core designer)
Objectives
Prevent under-reportingof IP core instances,
Make illegal copiesunusable.
Constraint Keep the overall cost
inferior to the financiallosses on illegal copying.
![Page 16: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and](https://reader035.fdocuments.net/reader035/viewer/2022071015/5fce25d6b3b59157fe1f00ae/html5/thumbnails/16.jpg)
Objective 6/51
Objective: a licensing scheme for IP cores
Ï Before activation: The IP core does not operate correctly/at all. During activation: The IP core must be provided with the
correct, instance-specific activation word± After activation: The IP core operates normally.
Business Monetization, Pay-per-use, Royalties.
Software Modified design flow, Database, Key management.
Hardware Activation, ID, Security.
![Page 17: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and](https://reader035.fdocuments.net/reader035/viewer/2022071015/5fce25d6b3b59157fe1f00ae/html5/thumbnails/17.jpg)
Objective 6/51
Objective: a licensing scheme for IP cores
Ï Before activation: The IP core does not operate correctly/at all. During activation: The IP core must be provided with the
correct, instance-specific activation word± After activation: The IP core operates normally.
Business Monetization, Pay-per-use, Royalties.
Software Modified design flow, Database, Key management.
Hardware Activation, ID, Security.
![Page 18: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and](https://reader035.fdocuments.net/reader035/viewer/2022071015/5fce25d6b3b59157fe1f00ae/html5/thumbnails/18.jpg)
Objective 7/51
A secure remote activation scheme that is:
Easy to use by legitimate parties, seamless integration into the standard design flow,
low impact on the performances of the IP core,
usable for any IP core (universal),
Hard to circumvent for an adversary, impossibility to use illegal copies,
security guaranteed by a cipher,
instance-specific identifier.
![Page 19: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and](https://reader035.fdocuments.net/reader035/viewer/2022071015/5fce25d6b3b59157fe1f00ae/html5/thumbnails/19.jpg)
Contributions and outline
![Page 20: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and](https://reader035.fdocuments.net/reader035/viewer/2022071015/5fce25d6b3b59157fe1f00ae/html5/thumbnails/20.jpg)
Standard (and heavily simplified) design flow 8/51
![Page 21: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and](https://reader035.fdocuments.net/reader035/viewer/2022071015/5fce25d6b3b59157fe1f00ae/html5/thumbnails/21.jpg)
Augmented design flow 9/51
Logic modifications
Modify the combinational logic toallow to controllably: Lock the outputs (logic locking), Alter the outputs (logic masking).
Activation
Intrinsic identification of theinstances of the IP core.
Secure transfer of theinstance-specific activation word.
![Page 22: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and](https://reader035.fdocuments.net/reader035/viewer/2022071015/5fce25d6b3b59157fe1f00ae/html5/thumbnails/22.jpg)
Augmented design flow 9/51
Logic modifications
Modify the combinational logic toallow to controllably: Lock the outputs (logic locking), Alter the outputs (logic masking).
Activation
Intrinsic identification of theinstances of the IP core.
Secure transfer of theinstance-specific activation word.
![Page 23: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and](https://reader035.fdocuments.net/reader035/viewer/2022071015/5fce25d6b3b59157fe1f00ae/html5/thumbnails/23.jpg)
Outline 10/51
Outline:
1. Computationally-efficient selection heuristics for logic masking
2. Combinational logic locking for very large netlists
3. Lightweight error-correction module for PUF responses
4. Overall integration and demonstrator
![Page 24: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and](https://reader035.fdocuments.net/reader035/viewer/2022071015/5fce25d6b3b59157fe1f00ae/html5/thumbnails/24.jpg)
Scalable logic maskingwith centrality indicators
![Page 25: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and](https://reader035.fdocuments.net/reader035/viewer/2022071015/5fce25d6b3b59157fe1f00ae/html5/thumbnails/25.jpg)
Logic masking: definition 11/51
The netlist is modified and an associated AW is obtained [4].
[4] J. A. Roy, F. Koushanfar, and I. Markov. “EPIC: Ending Piracy of Integrated Circuits”. DATE.2008, pp. 1069–1074
![Page 26: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and](https://reader035.fdocuments.net/reader035/viewer/2022071015/5fce25d6b3b59157fe1f00ae/html5/thumbnails/26.jpg)
Logic masking: definition 12/51
Principle
Insert XOR and XNOR gates at specific locations in the netlist
Original netlist Masked netlist
Objective: masking efficiency
The outputs should be as different as possible if AW is wrong
![Page 27: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and](https://reader035.fdocuments.net/reader035/viewer/2022071015/5fce25d6b3b59157fe1f00ae/html5/thumbnails/27.jpg)
Logic masking: definition 12/51
Principle
Insert XOR and XNOR gates at specific locations in the netlist
Original netlist Masked netlist
Objective: masking efficiency
The outputs should be as different as possible if AW is wrong
![Page 28: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and](https://reader035.fdocuments.net/reader035/viewer/2022071015/5fce25d6b3b59157fe1f00ae/html5/thumbnails/28.jpg)
Nodes selection heuristics 13/51
Several heuristics exist to select the place of insertion:
Selection Year Masking Computationalheuristic efficiency complexity
Random [4] 2008 Ï ±Fan-in/fan-out cones [5] 2009 Ï ±Fault analysis [6] 2015 ± Ï
[4] J. A. Roy, F. Koushanfar, and I. Markov. “EPIC: Ending Piracy of Integrated Circuits”. DATE.2008, pp. 1069–1074[5] R. S. Chakraborty and S. Bhunia. “HARPOON: An Obfuscation-Based SoC Design
Methodology for Hardware Protection”. IEEE Trans. on CAD of IC and Systems 28.10 (2009),pp. 1493–1502[6] J. Rajendran et al. “Fault Analysis-Based Logic Encryption”. IEEE Transactions on
Computers 64.2 (2015), pp. 410–424
![Page 29: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and](https://reader035.fdocuments.net/reader035/viewer/2022071015/5fce25d6b3b59157fe1f00ae/html5/thumbnails/29.jpg)
Graph representation of a gate-level netlist 14/51
Conversion rules
Wires VerticesLogic gates Edges
Logic masking heuristic
Insert XOR/XNOR gates on verticesthat have the highest centrality.
![Page 30: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and](https://reader035.fdocuments.net/reader035/viewer/2022071015/5fce25d6b3b59157fe1f00ae/html5/thumbnails/30.jpg)
Graph representation of a gate-level netlist 14/51
Conversion rules
Wires VerticesLogic gates Edges
Logic masking heuristic
Insert XOR/XNOR gates on verticesthat have the highest centrality.
![Page 31: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and](https://reader035.fdocuments.net/reader035/viewer/2022071015/5fce25d6b3b59157fe1f00ae/html5/thumbnails/31.jpg)
Centrality indicators 15/51
Centrality: Importance of a given vertex inside a graph
Twitter network graph, Copyright Marc Smith on Flickr under license CC BY 2.0
![Page 32: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and](https://reader035.fdocuments.net/reader035/viewer/2022071015/5fce25d6b3b59157fe1f00ae/html5/thumbnails/32.jpg)
Centrality indicators 15/51
Centrality: Importance of a given vertex inside a graph
Twitter network graph, Copyright Marc Smith on Flickr under license CC BY 2.0
![Page 33: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and](https://reader035.fdocuments.net/reader035/viewer/2022071015/5fce25d6b3b59157fe1f00ae/html5/thumbnails/33.jpg)
Comparison of centrality indicators 16/51
Degree Betwenness Current-flowbetweenness
0.04 0.02 0.00 0.02 0.040.050
0.025
0.000
0.025
0.050
0
0.5
1
Cent
ralit
y
Closeness Current-flow closeness
![Page 34: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and](https://reader035.fdocuments.net/reader035/viewer/2022071015/5fce25d6b3b59157fe1f00ae/html5/thumbnails/34.jpg)
Masking efficiency VS computational complexity 17/51
0.0 0.2 0.4 0.6 0.8 1.0Bitwise output correlation
1
10
100
1k
10k
100k
Com
puta
tion
time
ratio
VS ra
ndom
sele
ctio
nCentrality indicator
ClosenessBetweenness
Current-flow betweennessCurrent-flow closeness
Other heuristicsRandomFan-in/Fan-out conesFault-analysis
Current-flow closeness
Bitwise correlation is almost as low as for the faultanalysis-based heuristic, for a 1000x shorter run-time.
![Page 35: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and](https://reader035.fdocuments.net/reader035/viewer/2022071015/5fce25d6b3b59157fe1f00ae/html5/thumbnails/35.jpg)
Current-flow closeness centrality 18/51
0.04 0.02 0.00 0.02 0.040.050
0.025
0.000
0.025
0.050
0
0.5
1
Cent
ralit
y
Definition:Inverse of the sum of effective resistancebetween the vertex of interest and all theother vertices of the graph.
C(v) = 1∑y∈V
Reff(v,y)
![Page 36: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and](https://reader035.fdocuments.net/reader035/viewer/2022071015/5fce25d6b3b59157fe1f00ae/html5/thumbnails/36.jpg)
Current-flow closeness centrality 18/51
0.04 0.02 0.00 0.02 0.040.050
0.025
0.000
0.025
0.050
0
0.5
1
Cent
ralit
y
Definition:Inverse of the sum of effective resistancebetween the vertex of interest and all theother vertices of the graph.
C(v) = 1∑y∈V
Reff(v,y)
![Page 37: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and](https://reader035.fdocuments.net/reader035/viewer/2022071015/5fce25d6b3b59157fe1f00ae/html5/thumbnails/37.jpg)
Current-flow closeness centrality 18/51
0.04 0.02 0.00 0.02 0.040.050
0.025
0.000
0.025
0.050
0
0.5
1
Cent
ralit
y
Definition:Inverse of the sum of effective resistancebetween the vertex of interest and all theother vertices of the graph.
C(v) = 1∑y∈V
Reff(v,y)
![Page 38: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and](https://reader035.fdocuments.net/reader035/viewer/2022071015/5fce25d6b3b59157fe1f00ae/html5/thumbnails/38.jpg)
Logic masking using centrality indicators: conclusion 19/51
Logic masking using centrality indicators:± better trade-off than existing heuristics between masking
efficiency and computational complexity,± only efficientmasking selection heuristic for real-life netlists.
5 could be parallelized.
Associated publication:
W B. Colombier, L. Bossuet, and D. Hély. “Centrality Indicators for Efficient and Scalable LogicMasking”. ISVLSI. 2017, pp. 98–103
![Page 39: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and](https://reader035.fdocuments.net/reader035/viewer/2022071015/5fce25d6b3b59157fe1f00ae/html5/thumbnails/39.jpg)
Combinational logic locking
![Page 40: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and](https://reader035.fdocuments.net/reader035/viewer/2022071015/5fce25d6b3b59157fe1f00ae/html5/thumbnails/40.jpg)
Logic locking: definition 20/51
The netlist is modified and an AW (activation word) is obtained.
![Page 41: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and](https://reader035.fdocuments.net/reader035/viewer/2022071015/5fce25d6b3b59157fe1f00ae/html5/thumbnails/41.jpg)
Logic locking: definition 21/51
Principle
Insert AND and OR gates at specific locations in the netlist
Original netlist Locked netlist
Objective
The outputs should be forced to a fixed logic value.
![Page 42: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and](https://reader035.fdocuments.net/reader035/viewer/2022071015/5fce25d6b3b59157fe1f00ae/html5/thumbnails/42.jpg)
Logic locking: definition 21/51
Principle
Insert AND and OR gates at specific locations in the netlist
Original netlist Locked netlist
Objective
The outputs should be forced to a fixed logic value.
![Page 43: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and](https://reader035.fdocuments.net/reader035/viewer/2022071015/5fce25d6b3b59157fe1f00ae/html5/thumbnails/43.jpg)
Principle of combinational logic locking 22/51
Identify nodes inside the netlist that propagate a locking value.
Condition for propagating a locking value
The node is forced to the controlling value of the next gate.
![Page 44: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and](https://reader035.fdocuments.net/reader035/viewer/2022071015/5fce25d6b3b59157fe1f00ae/html5/thumbnails/44.jpg)
Principle of combinational logic locking 22/51
Identify nodes inside the netlist that propagate a locking value.
Condition for propagating a locking value
The node is forced to the controlling value of the next gate.
![Page 45: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and](https://reader035.fdocuments.net/reader035/viewer/2022071015/5fce25d6b3b59157fe1f00ae/html5/thumbnails/45.jpg)
Principle of combinational logic locking 22/51
Identify nodes inside the netlist that propagate a locking value.
Condition for propagating a locking value
The node is forced to the controlling value of the next gate.
![Page 46: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and](https://reader035.fdocuments.net/reader035/viewer/2022071015/5fce25d6b3b59157fe1f00ae/html5/thumbnails/46.jpg)
Principle of combinational logic locking 22/51
Identify nodes inside the netlist that propagate a locking value.
Condition for propagating a locking value
The node is forced to the controlling value of the next gate.
![Page 47: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and](https://reader035.fdocuments.net/reader035/viewer/2022071015/5fce25d6b3b59157fe1f00ae/html5/thumbnails/47.jpg)
Graph processing 23/51
Processing
Remove the incoming edges of vertices that are associatedwith nodes that cannot propagate a locking value.
![Page 48: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and](https://reader035.fdocuments.net/reader035/viewer/2022071015/5fce25d6b3b59157fe1f00ae/html5/thumbnails/48.jpg)
Selection of the nodes to lock 24/51
SelectionSelect the nodes that are as far as possible fromthe outputs and lock as many outputs as possible.
![Page 49: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and](https://reader035.fdocuments.net/reader035/viewer/2022071015/5fce25d6b3b59157fe1f00ae/html5/thumbnails/49.jpg)
Locking gates insertion 25/51
Choice of the type of locking gate
Force to 0: insert an AND gate, Force to 1: insert an OR gate.
![Page 50: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and](https://reader035.fdocuments.net/reader035/viewer/2022071015/5fce25d6b3b59157fe1f00ae/html5/thumbnails/50.jpg)
Experimental results: processing time 26/51
ITC’99 benchmarks: 1k to 200k gates.
1k 10k 100k#logic gates
1
10
100
1000
Anal
ysis
time
(s)
1 s
1 min
1 h
Netlists of up to 20k gates are processed in less than aminute.
Netlists of up to 200k gates are processed in less than an hour.
![Page 51: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and](https://reader035.fdocuments.net/reader035/viewer/2022071015/5fce25d6b3b59157fe1f00ae/html5/thumbnails/51.jpg)
Experimental results: area overhead 27/51
1k 10k 100k#logic gates
1
2
3
4
5
Area
ove
rhea
d (%
)
2.89
Average overhead
Locking all the outputs requires an area overhead below 3%.
![Page 52: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and](https://reader035.fdocuments.net/reader035/viewer/2022071015/5fce25d6b3b59157fe1f00ae/html5/thumbnails/52.jpg)
Combinational logic locking: conclusion 28/51
Combinational logic locking:± is the onlymethod for logic modifications that can handle
very large netlists (200k logic gates in less than one hour),± has a low area overhead below 3%.± offers obfuscation possibilities: interleaving, NAND/NOR gates.
Associated publications:
W B. Colombier, L. Bossuet, and D. Hély. “From Secured Logic to IP Protection”. ElsevierMicroprocessors and Microsystems 47 (2016), pp. 44–54
W B. Colombier, L. Bossuet, and D. Hély. “Reversible Denial-of-Service by Locking GatesInsertion for IP Cores Design Protection”. ISVLSI. 2015, pp. 210–215
![Page 53: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and](https://reader035.fdocuments.net/reader035/viewer/2022071015/5fce25d6b3b59157fe1f00ae/html5/thumbnails/53.jpg)
Attacks on combinational logic modifications 29/51
Efficientmasking methods are vulnerable to attacks targetting AW: Hill-climbing [7] SAT [8]
Solution
Not expose AW input, drive it with the output of a cipher.
[7] S. M. Plaza and I. L. Markov. “Solving the Third-Shift Problem in IC Piracy With Test-AwareLogic Locking”. IEEE Trans. on CAD of Integrated Circuits and Systems 34.6 (2015), pp. 961–971[8] P. Subramanyan, S. Ray, and S. Malik. “Evaluating the security of logic encryption
algorithms”. HOST. 2015, pp. 137–143
![Page 54: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and](https://reader035.fdocuments.net/reader035/viewer/2022071015/5fce25d6b3b59157fe1f00ae/html5/thumbnails/54.jpg)
Key reconciliation protocol forerror correction in PUF responses
![Page 55: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and](https://reader035.fdocuments.net/reader035/viewer/2022071015/5fce25d6b3b59157fe1f00ae/html5/thumbnails/55.jpg)
Physical Unclonable Functions (PUFs) 30/51
PUFs are the fingerprints of integrated circuits.
Uniqueness property
Because of random manufacturing process variations,r is different from one PUF instance to the other.
![Page 56: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and](https://reader035.fdocuments.net/reader035/viewer/2022071015/5fce25d6b3b59157fe1f00ae/html5/thumbnails/56.jpg)
Physical Unclonable Functions (PUFs) 30/51
PUFs are the fingerprints of integrated circuits.
Uniqueness property
Because of random manufacturing process variations,r is different from one PUF instance to the other.
![Page 57: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and](https://reader035.fdocuments.net/reader035/viewer/2022071015/5fce25d6b3b59157fe1f00ae/html5/thumbnails/57.jpg)
Physical Unclonable Functions (PUFs) 30/51
PUFs are the fingerprints of integrated circuits.
Uniqueness property
Because of random manufacturing process variations,r is different from one PUF instance to the other.
![Page 58: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and](https://reader035.fdocuments.net/reader035/viewer/2022071015/5fce25d6b3b59157fe1f00ae/html5/thumbnails/58.jpg)
Physical Unclonable Functions (PUFs) 30/51
PUFs are the fingerprints of integrated circuits.
Uniqueness property
Because of random manufacturing process variations,r is different from one PUF instance to the other.
![Page 59: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and](https://reader035.fdocuments.net/reader035/viewer/2022071015/5fce25d6b3b59157fe1f00ae/html5/thumbnails/59.jpg)
The instability issue 31/51
Problem
PUF responses to the same challenge change over time.
This variation depends on multiple parameters: PUF architecture, Process node, Aging, Temperature, Environment, etc.
![Page 60: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and](https://reader035.fdocuments.net/reader035/viewer/2022071015/5fce25d6b3b59157fe1f00ae/html5/thumbnails/60.jpg)
Error correction for PUF responses 32/51
Solution
Apply a technique of error correction to the PUF response
![Page 61: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and](https://reader035.fdocuments.net/reader035/viewer/2022071015/5fce25d6b3b59157fe1f00ae/html5/thumbnails/61.jpg)
Error correction for PUF responses 32/51
Solution
Apply a technique of error correction to the PUF response
![Page 62: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and](https://reader035.fdocuments.net/reader035/viewer/2022071015/5fce25d6b3b59157fe1f00ae/html5/thumbnails/62.jpg)
Error correction for PUF responses 32/51
Solution
Apply a technique of error correction to the PUF response
![Page 63: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and](https://reader035.fdocuments.net/reader035/viewer/2022071015/5fce25d6b3b59157fe1f00ae/html5/thumbnails/63.jpg)
Similarities between two scenarios 33/51
Quantum key exchange
|key| < |m|
PUF-based ID generation
|ID| < |rt|
![Page 64: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and](https://reader035.fdocuments.net/reader035/viewer/2022071015/5fce25d6b3b59157fe1f00ae/html5/thumbnails/64.jpg)
CASCADE protocol 34/51
One pass
Perform parity checks on blocks of the PUF response, Isolate the errors using binary search and correct them, Check current parity of blocks and backtrack, Increase the block size and shuffle the response randomly.
Parameters
Initial block size, Number of passes,
Block size multiplier.
Information leakage associated with the public discussion
For an n-bit response split into k-bit blocks: Parity checks: n/k-bit leakage. Binary search: log2(k)-bit leakage.
![Page 65: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and](https://reader035.fdocuments.net/reader035/viewer/2022071015/5fce25d6b3b59157fe1f00ae/html5/thumbnails/65.jpg)
CASCADE protocol 34/51
One pass
Perform parity checks on blocks of the PUF response, Isolate the errors using binary search and correct them, Check current parity of blocks and backtrack, Increase the block size and shuffle the response randomly.
Parameters
Initial block size, Number of passes,
Block size multiplier.
Information leakage associated with the public discussion
For an n-bit response split into k-bit blocks: Parity checks: n/k-bit leakage. Binary search: log2(k)-bit leakage.
![Page 66: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and](https://reader035.fdocuments.net/reader035/viewer/2022071015/5fce25d6b3b59157fe1f00ae/html5/thumbnails/66.jpg)
CASCADE protocol 34/51
One pass
Perform parity checks on blocks of the PUF response, Isolate the errors using binary search and correct them, Check current parity of blocks and backtrack, Increase the block size and shuffle the response randomly.
Parameters
Initial block size, Number of passes,
Block size multiplier.
Information leakage associated with the public discussion
For an n-bit response split into k-bit blocks: Parity checks: n/k-bit leakage. Binary search: log2(k)-bit leakage.
![Page 67: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and](https://reader035.fdocuments.net/reader035/viewer/2022071015/5fce25d6b3b59157fe1f00ae/html5/thumbnails/67.jpg)
CASCADE execution 34/51
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
Blocks of evenrelative parity:
∅Blocks of oddrelative parity:
∅
Relative parity: Pr(B0, Bt) =( m−1⊕
i=0
r0[B0[i]])
︸ ︷︷ ︸Parity of B0
⊕( m−1⊕
i=0
rt[Bt[i]])
︸ ︷︷ ︸Parity of Bt
![Page 68: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and](https://reader035.fdocuments.net/reader035/viewer/2022071015/5fce25d6b3b59157fe1f00ae/html5/thumbnails/68.jpg)
CASCADE execution 34/51
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
Correction
Blocks of evenrelative parity:
∅Blocks of oddrelative parity:
∅
Relative parity: Pr(B0, Bt) =( m−1⊕
i=0
r0[B0[i]])
︸ ︷︷ ︸Parity of B0
⊕( m−1⊕
i=0
rt[Bt[i]])
︸ ︷︷ ︸Parity of Bt
![Page 69: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and](https://reader035.fdocuments.net/reader035/viewer/2022071015/5fce25d6b3b59157fe1f00ae/html5/thumbnails/69.jpg)
CASCADE execution 34/51
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
Correction
Blocks of evenrelative parity:
3210 7654
111098 15141312
Blocks of oddrelative parity:
∅
Relative parity: Pr(B0, Bt) =( m−1⊕
i=0
r0[B0[i]])
︸ ︷︷ ︸Parity of B0
⊕( m−1⊕
i=0
rt[Bt[i]])
︸ ︷︷ ︸Parity of Bt
![Page 70: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and](https://reader035.fdocuments.net/reader035/viewer/2022071015/5fce25d6b3b59157fe1f00ae/html5/thumbnails/70.jpg)
CASCADE execution 34/51
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
0 12 34 5 67 89 10 1112 1314 15
Correction
Shuffling
Blocks of evenrelative parity:
3210 7654
111098 15141312
Blocks of oddrelative parity:
∅
Relative parity: Pr(B0, Bt) =( m−1⊕
i=0
r0[B0[i]])
︸ ︷︷ ︸Parity of B0
⊕( m−1⊕
i=0
rt[Bt[i]])
︸ ︷︷ ︸Parity of Bt
![Page 71: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and](https://reader035.fdocuments.net/reader035/viewer/2022071015/5fce25d6b3b59157fe1f00ae/html5/thumbnails/71.jpg)
CASCADE execution 34/51
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
0 12 34 5 67 89 10 1112 1314 15
0 12 34 5 67 89 10 1112 1314 15
Correction
Shuffling
Correction
Blocks of evenrelative parity:
3210 7654
111098 15141312
Blocks of oddrelative parity:
∅
Relative parity: Pr(B0, Bt) =( m−1⊕
i=0
r0[B0[i]])
︸ ︷︷ ︸Parity of B0
⊕( m−1⊕
i=0
rt[Bt[i]])
︸ ︷︷ ︸Parity of Bt
![Page 72: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and](https://reader035.fdocuments.net/reader035/viewer/2022071015/5fce25d6b3b59157fe1f00ae/html5/thumbnails/72.jpg)
CASCADE execution 34/51
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
0 12 34 5 67 89 10 1112 1314 15
0 12 34 5 67 89 10 1112 1314 15
Correction
Shuffling
Correction
Blocks of evenrelative parity:
3210 7654
111098 15141312
118102 16153
741412 51309
Blocks of oddrelative parity:
∅
Relative parity: Pr(B0, Bt) =( m−1⊕
i=0
r0[B0[i]])
︸ ︷︷ ︸Parity of B0
⊕( m−1⊕
i=0
rt[Bt[i]])
︸ ︷︷ ︸Parity of Bt
![Page 73: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and](https://reader035.fdocuments.net/reader035/viewer/2022071015/5fce25d6b3b59157fe1f00ae/html5/thumbnails/73.jpg)
CASCADE execution 34/51
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
0 12 34 5 67 89 10 1112 1314 15
0 12 34 5 67 89 10 1112 1314 15
Correction
Shuffling
Correction
Blocks of evenrelative parity:
3210 7654
111098 15141312
118102 16153
741412 51309
Blocks of oddrelative parity:
∅
Relative parity: Pr(B0, Bt) =( m−1⊕
i=0
r0[B0[i]])
︸ ︷︷ ︸Parity of B0
⊕( m−1⊕
i=0
rt[Bt[i]])
︸ ︷︷ ︸Parity of Bt
![Page 74: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and](https://reader035.fdocuments.net/reader035/viewer/2022071015/5fce25d6b3b59157fe1f00ae/html5/thumbnails/74.jpg)
CASCADE execution 34/51
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
0 12 34 5 67 89 10 1112 1314 15
0 12 34 5 67 89 10 1112 1314 15
Correction
Shuffling
Correction
Blocks of evenrelative parity:
3210 7654
118102 16153
741412 51309
Blocks of oddrelative parity:
111098 15141312
Relative parity: Pr(B0, Bt) =( m−1⊕
i=0
r0[B0[i]])
︸ ︷︷ ︸Parity of B0
⊕( m−1⊕
i=0
rt[Bt[i]])
︸ ︷︷ ︸Parity of Bt
![Page 75: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and](https://reader035.fdocuments.net/reader035/viewer/2022071015/5fce25d6b3b59157fe1f00ae/html5/thumbnails/75.jpg)
CASCADE execution 34/51
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
0 12 34 5 67 89 10 1112 1314 15
0 12 34 5 67 89 10 1112 1314 15
0 12 34 5 67 89 10 1112 1314 15
Correction
Shuffling
Correction
Extra correction
Blocks of evenrelative parity:
3210 7654
118102 16153
741412 51309
Blocks of oddrelative parity:
111098 15141312
Relative parity: Pr(B0, Bt) =( m−1⊕
i=0
r0[B0[i]])
︸ ︷︷ ︸Parity of B0
⊕( m−1⊕
i=0
rt[Bt[i]])
︸ ︷︷ ︸Parity of Bt
![Page 76: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and](https://reader035.fdocuments.net/reader035/viewer/2022071015/5fce25d6b3b59157fe1f00ae/html5/thumbnails/76.jpg)
CASCADE execution 34/51
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
0 12 34 5 67 89 10 1112 1314 15
0 12 34 5 67 89 10 1112 1314 15
0 12 34 5 67 89 10 1112 1314 15
Correction
Shuffling
Correction
Extra correction
Blocks of evenrelative parity:
3210 7654
118102 16153
741412 51309
Blocks of oddrelative parity:
111098 15141312
Relative parity: Pr(B0, Bt) =( m−1⊕
i=0
r0[B0[i]])
︸ ︷︷ ︸Parity of B0
⊕( m−1⊕
i=0
rt[Bt[i]])
︸ ︷︷ ︸Parity of Bt
![Page 77: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and](https://reader035.fdocuments.net/reader035/viewer/2022071015/5fce25d6b3b59157fe1f00ae/html5/thumbnails/77.jpg)
CASCADE execution 34/51
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
0 12 34 5 67 89 10 1112 1314 15
0 12 34 5 67 89 10 1112 1314 15
0 12 34 5 67 89 10 1112 1314 15
Correction
Shuffling
Correction
Extra correction
Blocks of evenrelative parity:
3210 7654
111098
118102 16153
Blocks of oddrelative parity:
15141312
741412 51309
Relative parity: Pr(B0, Bt) =( m−1⊕
i=0
r0[B0[i]])
︸ ︷︷ ︸Parity of B0
⊕( m−1⊕
i=0
rt[Bt[i]])
︸ ︷︷ ︸Parity of Bt
![Page 78: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and](https://reader035.fdocuments.net/reader035/viewer/2022071015/5fce25d6b3b59157fe1f00ae/html5/thumbnails/78.jpg)
CASCADE execution 34/51
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
0 12 34 5 67 89 10 1112 1314 15
0 12 34 5 67 89 10 1112 1314 15
0 12 34 5 67 89 10 1112 1314 15
0 12 34 5 67 89 10 1112 1314 15
Correction
Shuffling
Correction
Extra correction
Extra correction
Blocks of evenrelative parity:
3210 7654
111098
118102 16153
Blocks of oddrelative parity:
15141312
741412 51309
Relative parity: Pr(B0, Bt) =( m−1⊕
i=0
r0[B0[i]])
︸ ︷︷ ︸Parity of B0
⊕( m−1⊕
i=0
rt[Bt[i]])
︸ ︷︷ ︸Parity of Bt
![Page 79: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and](https://reader035.fdocuments.net/reader035/viewer/2022071015/5fce25d6b3b59157fe1f00ae/html5/thumbnails/79.jpg)
CASCADE execution 34/51
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
0 12 34 5 67 89 10 1112 1314 15
0 12 34 5 67 89 10 1112 1314 15
0 12 34 5 67 89 10 1112 1314 15
0 12 34 5 67 89 10 1112 1314 15
Correction
Shuffling
Correction
Extra correction
Extra correction
Blocks of evenrelative parity:
3210 7654
111098
118102 16153
Blocks of oddrelative parity:
15141312
741412 51309
Relative parity: Pr(B0, Bt) =( m−1⊕
i=0
r0[B0[i]])
︸ ︷︷ ︸Parity of B0
⊕( m−1⊕
i=0
rt[Bt[i]])
︸ ︷︷ ︸Parity of Bt
![Page 80: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and](https://reader035.fdocuments.net/reader035/viewer/2022071015/5fce25d6b3b59157fe1f00ae/html5/thumbnails/80.jpg)
CASCADE execution 34/51
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
0 12 34 5 67 89 10 1112 1314 15
0 12 34 5 67 89 10 1112 1314 15
0 12 34 5 67 89 10 1112 1314 15
0 12 34 5 67 89 10 1112 1314 15
Correction
Shuffling
Correction
Extra correction
Extra correction
Blocks of evenrelative parity:
3210 7654
111098 15141312
118102 16153
741412 51309
Blocks of oddrelative parity:
∅
Relative parity: Pr(B0, Bt) =( m−1⊕
i=0
r0[B0[i]])
︸ ︷︷ ︸Parity of B0
⊕( m−1⊕
i=0
rt[Bt[i]])
︸ ︷︷ ︸Parity of Bt
![Page 81: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and](https://reader035.fdocuments.net/reader035/viewer/2022071015/5fce25d6b3b59157fe1f00ae/html5/thumbnails/81.jpg)
Real-life example 35/51
PUFs based on oscillators have a typical error-rate of 2-3% [9] [10].Keep 128 bits secret from a 256-bit response with failure rate < 10-6.
0 1 3 5 10 15 20Passes
0163264
128
206
256
Fina
l res
pons
e le
ngth
(bits
)
4-bit initial blocks8-bit initial blocks
16-bit initial blocks32-bit initial blocks
Security thresholdShannon bound
0 5 10 15 20Passes
1
10 1
10 2
10 3
10 4
10 5
< 10 6
Failu
re ra
te
0 1 3 5 10 15 20Passes
03264
128
206
256
Fina
l res
pons
e le
ngth
(bits
)
[9] A. Maiti, J. Casarona, L. McHale, and P. Schaumont. “A large scale characterization ofRO-PUF”. . HOST. 2010, pp. 94–99[10] A. Cherkaoui, L. Bossuet, and C. Marchand. “Design, Evaluation and Optimization ofPhysical Unclonable Functions based on Transient Effect Ring Oscillators”. IEEE Transactions onInformation Forensics and Security 11.6 (2016), pp. 1291–1305
![Page 82: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and](https://reader035.fdocuments.net/reader035/viewer/2022071015/5fce25d6b3b59157fe1f00ae/html5/thumbnails/82.jpg)
Real-life example 35/51
PUFs based on oscillators have a typical error-rate of 2-3% [9] [10].Keep 128 bits secret from a 256-bit response with failure rate < 10-6.
0 1 3 5 10 15 20Passes
0163264
128
206
256
Fina
l res
pons
e le
ngth
(bits
)
4-bit initial blocks8-bit initial blocks
16-bit initial blocks32-bit initial blocks
Security thresholdShannon bound
0 5 10 15 20Passes
1
10 1
10 2
10 3
10 4
10 5
< 10 6
Failu
re ra
te
0 1 3 5 10 15 20Passes
03264
128
206
256
Fina
l res
pons
e le
ngth
(bits
)
[9] A. Maiti, J. Casarona, L. McHale, and P. Schaumont. “A large scale characterization ofRO-PUF”. . HOST. 2010, pp. 94–99[10] A. Cherkaoui, L. Bossuet, and C. Marchand. “Design, Evaluation and Optimization ofPhysical Unclonable Functions based on Transient Effect Ring Oscillators”. IEEE Transactions onInformation Forensics and Security 11.6 (2016), pp. 1291–1305
![Page 83: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and](https://reader035.fdocuments.net/reader035/viewer/2022071015/5fce25d6b3b59157fe1f00ae/html5/thumbnails/83.jpg)
Real-life example 35/51
PUFs based on oscillators have a typical error-rate of 2-3% [9] [10].Keep 128 bits secret from a 256-bit response with failure rate < 10-6.
0 1 3 5 10 15 20Passes
0163264
128
206
256
Fina
l res
pons
e le
ngth
(bits
)
4-bit initial blocks8-bit initial blocks
16-bit initial blocks32-bit initial blocks
Security thresholdShannon bound
0 5 10 15 20Passes
1
10 1
10 2
10 3
10 4
10 5
< 10 6
Failu
re ra
te
0 1 3 5 10 15 20Passes
03264
128
206
256
Fina
l res
pons
e le
ngth
(bits
)
[9] A. Maiti, J. Casarona, L. McHale, and P. Schaumont. “A large scale characterization ofRO-PUF”. . HOST. 2010, pp. 94–99[10] A. Cherkaoui, L. Bossuet, and C. Marchand. “Design, Evaluation and Optimization ofPhysical Unclonable Functions based on Transient Effect Ring Oscillators”. IEEE Transactions onInformation Forensics and Security 11.6 (2016), pp. 1291–1305
![Page 84: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and](https://reader035.fdocuments.net/reader035/viewer/2022071015/5fce25d6b3b59157fe1f00ae/html5/thumbnails/84.jpg)
Hardware architectures for the parity computation module 36/51
Logic resources: Spartan 3: 67 Slices Spartan 6: 19 Slices 0 RAM bits
Logic resources: Spartan 3: 3 Slices Spartan 6: 1 Slice 256 RAM bits
![Page 85: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and](https://reader035.fdocuments.net/reader035/viewer/2022071015/5fce25d6b3b59157fe1f00ae/html5/thumbnails/85.jpg)
Classical error-correcting codes for PUFs 37/51
Article Construction and code(s) Logic resources (Slices) BlockSpartan 3 Spartan 6 RAM bits
[11] Reed-Muller (4, 7) 179 0
[12] Reed-Muller (2, 6) 164 192
[13] Concatenated: Repetition and Reed Muller 168 0
[14] Differential Sequence Coding and Viterbi 75 27 10752
This work: CASCADE protocol logic only 67 19 0
with RAM 3 1 256
[11] M. Hiller et al. “Low-Area Reed Decoding in a Generalized Concatenated CodeConstruction for PUFs”. ISVLSI. 2015, pp. 143–148[12] R. Maes, P. Tuyls, and I. Verbauwhede. “Low-Overhead Implementation of a Soft DecisionHelper Data Algorithm for SRAM PUFs”. CHES. 2009, pp. 332–347[13] C. Bösch et al. “Efficient Helper Data Key Extractor on FPGAs”. CHES. 2008, pp. 181–197[14] M. Hiller, M. Yu, and G. Sigl. “Cherry-Picking Reliable PUF Bits With Differential SequenceCoding”. IEEE Trans. Information Forensics and Security 11.9 (2016), pp. 2065–2076
![Page 86: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and](https://reader035.fdocuments.net/reader035/viewer/2022071015/5fce25d6b3b59157fe1f00ae/html5/thumbnails/86.jpg)
Key reconciliation protocol for PUF responses: conclusion 38/51
First usage of a key reconciliation protocol for PUF responses:± most lightweight error-correction solution of state-of-the-art,± can reach very low failure rates (down to 10−8),± leakage is limited and easy to estimate,± parameterizable and can be changed on the fly.
Associated publication:
W B. Colombier, L. Bossuet, D. Hély, and V. Fischer. “Key Reconciliation Protocols for ErrorCorrection of Silicon PUF Responses”. IEEE Transactions on Information Forensics and Security12.8 (2017), pp. 1988–2002
![Page 87: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and](https://reader035.fdocuments.net/reader035/viewer/2022071015/5fce25d6b3b59157fe1f00ae/html5/thumbnails/87.jpg)
Integration and demonstrator
![Page 88: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and](https://reader035.fdocuments.net/reader035/viewer/2022071015/5fce25d6b3b59157fe1f00ae/html5/thumbnails/88.jpg)
Objective 39/51
A secure remote activation scheme that is:
Easy to use by legitimate parties,± seamless integration into the standard design flow,
± low impact on the performances of the IP core,
± usable for any IP core (universal),
Hard to circumvent for an adversary,± impossibility to use illegal copies,
± instance-specific identifier,
± security guaranteed by a cipher [15].
[15] C. Marchand, L. Bossuet, and K. Gaj. “Area-oriented comparison of lightweight blockciphers implemented in hardware for the activation mechanism in the anti-counterfeitingschemes”. International Journal of Circuit Theory and Applications 45.2 (2017), pp. 274–291
![Page 89: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and](https://reader035.fdocuments.net/reader035/viewer/2022071015/5fce25d6b3b59157fe1f00ae/html5/thumbnails/89.jpg)
Hardware/software infrastructure 40/51
![Page 90: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and](https://reader035.fdocuments.net/reader035/viewer/2022071015/5fce25d6b3b59157fe1f00ae/html5/thumbnails/90.jpg)
Hardware/software infrastructure 40/51
![Page 91: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and](https://reader035.fdocuments.net/reader035/viewer/2022071015/5fce25d6b3b59157fe1f00ae/html5/thumbnails/91.jpg)
IP protection module overview 41/51
Intel Cyclone V Microsemi SF2
6-LUTs DFFs 4-LUTs DFFs
TERO-PUF 4841 160 2258 158Response shift register 0 128 0 128
Communication 321 2560 2664 2478MUX indexes 128x7:7 301 0 595 0
IP protection module ∼500 ∼350 ∼700 ∼350MUX response bits 128:1 67 0 85 0AW storage 0 128 0 128CASCADEmodule 1 1 1 1Controller 104 90 101 69Cipher [15] ∼300 ∼200 ∼500 ∼200
![Page 92: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and](https://reader035.fdocuments.net/reader035/viewer/2022071015/5fce25d6b3b59157fe1f00ae/html5/thumbnails/92.jpg)
Typical use-case at design time 42/51
Typical use-case at design time
Modify the combinational design to make it activable, Wrap the design with the additional components:
block cipher , PUF , CASCADE module , etc. Store the associated activation word.
![Page 93: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and](https://reader035.fdocuments.net/reader035/viewer/2022071015/5fce25d6b3b59157fe1f00ae/html5/thumbnails/93.jpg)
Typical use-case at enrollment time 43/51
Typical use-case at enrollment time
Get the PUF reference response, Optional: Characterize the PUF in operational conditions
to estimate the expected error-rate, Store the reference response on the server.
![Page 94: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and](https://reader035.fdocuments.net/reader035/viewer/2022071015/5fce25d6b3b59157fe1f00ae/html5/thumbnails/94.jpg)
Typical use-case at activation time 44/51
Typical use-case at activation time
Re-generate a PUF response on the device, Perform reconciliation to correct the PUF response on the
server side, Encrypt the activation word with the response and send it.
![Page 95: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and](https://reader035.fdocuments.net/reader035/viewer/2022071015/5fce25d6b3b59157fe1f00ae/html5/thumbnails/95.jpg)
IP protection module overview 45/51
https://gitlab.com/SALWARE/salware_hector_mbhttps://gitlab.com/SALWARE/salware_db_sf2
![Page 96: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and](https://reader035.fdocuments.net/reader035/viewer/2022071015/5fce25d6b3b59157fe1f00ae/html5/thumbnails/96.jpg)
Hardware/software infrastructure 46/51
![Page 97: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and](https://reader035.fdocuments.net/reader035/viewer/2022071015/5fce25d6b3b59157fe1f00ae/html5/thumbnails/97.jpg)
Software at design time 47/51
Parse the netlist (multiple formats) into a graph
Modify the graph for logic locking/masking
Convert back into a netlist
Add the AW decoder
Wrap with the extra components
![Page 98: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and](https://reader035.fdocuments.net/reader035/viewer/2022071015/5fce25d6b3b59157fe1f00ae/html5/thumbnails/98.jpg)
Software at enrolment/activation time 48/51
Get the PUF reference response and store it
Perform the reconciliation
Encrypt the AW and send it
https://gitlab.com/SALWARE/salware_appAssociated publications:
W B. Colombier et al. “Hardware Demo: Complete Activation Scheme for IP DesignProtection”. HOST. 2017W B. Colombier et al. “Hardware Demo: Complete Activation Scheme for IP DesignProtection”. FPL. 2017W B. Colombier, L. Bossuet, and D. Hély. “A comprehensive hardware/software infrastructurefor IP cores design protection”. FPT. 2017
![Page 99: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and](https://reader035.fdocuments.net/reader035/viewer/2022071015/5fce25d6b3b59157fe1f00ae/html5/thumbnails/99.jpg)
Software at enrolment/activation time 48/51
Get the PUF reference response and store it
Perform the reconciliation
Encrypt the AW and send it
https://gitlab.com/SALWARE/salware_appAssociated publications:
W B. Colombier et al. “Hardware Demo: Complete Activation Scheme for IP DesignProtection”. HOST. 2017W B. Colombier et al. “Hardware Demo: Complete Activation Scheme for IP DesignProtection”. FPL. 2017W B. Colombier, L. Bossuet, and D. Hély. “A comprehensive hardware/software infrastructurefor IP cores design protection”. FPT. 2017
![Page 100: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and](https://reader035.fdocuments.net/reader035/viewer/2022071015/5fce25d6b3b59157fe1f00ae/html5/thumbnails/100.jpg)
Conclusion and perspectives
![Page 101: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and](https://reader035.fdocuments.net/reader035/viewer/2022071015/5fce25d6b3b59157fe1f00ae/html5/thumbnails/101.jpg)
Conclusion 49/51
³Summary of contributions: Two methods of logic modifications for IP protection:
Logic locking: lightweight and scalable to very large netlists, Centrality-based logic masking: better trade-off between
computational complexity and masking efficiency,
First use of the CASCADE key reconciliation protocol with PUFs,10x more lightweight than existing ECCs,
Full integration and demonstrator.
Publications: 4 journals (2x IEEE TIFS, MICPRO, IET-CDT), 4 international conferences (2x ISVLSI, FCCM, FPT).
![Page 102: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and](https://reader035.fdocuments.net/reader035/viewer/2022071015/5fce25d6b3b59157fe1f00ae/html5/thumbnails/102.jpg)
Research perspectives 50/51
fPossible research perspectives: Fine-grained licensing approaches (evaluation, premium, etc), Security evaluation of hardware IP protections, Trusted computing: (un)trusted mode (un)locked IP core, Solutions for analog IP cores (25% of counterfeited ICs).
![Page 103: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and](https://reader035.fdocuments.net/reader035/viewer/2022071015/5fce25d6b3b59157fe1f00ae/html5/thumbnails/103.jpg)
Industrial perspectives 51/51
Possible industrial perspectives:
︷ ︸︸ ︷Business Monetization, Pay-per-use, Royalties.
Software Modified design flow, Database, Key management.
Hardware Activation, ID, Security.︸ ︷︷ ︸
—Questions ? —
![Page 104: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and](https://reader035.fdocuments.net/reader035/viewer/2022071015/5fce25d6b3b59157fe1f00ae/html5/thumbnails/104.jpg)
Industrial perspectives 51/51
Possible industrial perspectives:
︷ ︸︸ ︷Business Monetization, Pay-per-use, Royalties.
Software Modified design flow, Database, Key management.
Hardware Activation, ID, Security.︸ ︷︷ ︸
—Questions ? —