基于正交混淆的多硬件IP核安全防护设计
详细信息    查看全文 | 推荐本文 |
  • 英文篇名:Hardware Security for Multi IPs Protection Based on Orthogonal Obfuscation
  • 作者:张跃军 ; 王佳伟 ; 潘钊 ; 张晓伟 ; 汪鹏君
  • 英文作者:ZHANG Yuejun;WANG Jiawei;PAN Zhao;ZHANG Xiaowei;WANG Pengjun;Faculty of Electrical Engineering and Computer Science, Ningbo University;
  • 关键词:正交混淆 ; 合伙人组织 ; 物理不可克隆函数 ; 硬件IP安全性
  • 英文关键词:Orthogonal obfuscation;;PartnerShip Organization(PSO);;Physical Unclonable Function(PUF);;Hardware IPs security
  • 中文刊名:DZYX
  • 英文刊名:Journal of Electronics & Information Technology
  • 机构:宁波大学信息科学与工程学院;
  • 出版日期:2019-08-13
  • 出版单位:电子与信息学报
  • 年:2019
  • 期:v.41
  • 基金:国家自然科学基金(61871244,61874078,61704094);; 浙江省自然科学基金(LY18F040002);; 浙江省科技厅公益技术应用研究(2016C31078);; 亿像素视频加密与IP加密算法与硬件开发横向项目(HK2017000135);; 浙江省大学生新苗人才计划(2018R405071);; 宁波大学王宽诚幸福基金~~
  • 语种:中文;
  • 页:DZYX201908010
  • 页数:8
  • CN:08
  • ISSN:11-4494/TN
  • 分类号:74-81
摘要
为了解决集成电路设计中多方合作的成员信息泄漏问题,该文提出一种基于正交混淆的多硬件IP核安全防护方案。该方案首先利用正交混淆矩阵产生正交密钥数据,结合硬件特征的物理不可克隆函数(PUF)电路,产生多硬件IP核的混淆密钥;然后,在正交混淆状态机的基础上,实现多硬件IP核的正交混淆安全防护算法;最后,利用ISCAS-85基准电路和密码算法,验证正交混淆方法的有效性。在台湾积体电路制造股份有限公司(TSMC)65 nm工艺下测试正交混淆的多硬件IP核方案,正确密钥和错误密钥下的Toggle翻转率小于5%,在较大规模的测试电路中面积和功耗开销占比小于2%。实验结果表明,采用正交混淆的方式能够提高多硬件IP核的安全性,可以有效防御成员信息泄漏、状态翻转率分析等攻击。
        In order to solve the problem of member information leakage in multi-party cooperative design of integrated circuits, a orthogonal obfuscation scheme of multi-hardware IPs core security protection is proposed.Firstly, the orthogonal obfuscation matrix generates orthogonal key data, and the obfuscated key of the hardware IP core is designed with the physical feature of the Physical Unclonable Function(PUF) circuit. Then the security of multiple hardware IP cores is realized by the orthogonal obfuscation state machine. Finally, the validity of orthogonal aliasing is verified using the ISCAS-85 circuit and cryptographic algorithm. The multihardware IP core orthogonal obfuscation scheme is tested under Taiwan Semiconductor Manufacturing Company(TSMC) 65 nm process, the difference of Toggle flip rate between the correct key and the wrong key is less than 5%, and the area and power consumption of the larger test circuit are less than 2%. The experimental results show that orthogonal obfuscation can improve the security of multi-hardware IP cores, and can effectively defend against member information leakage and state flip rate analysis attacks.
引文
[1]FYRBIAK M,ROKICKI S,BISSANTZ N,et al.Hybrid obfuscation to protect against disclosure attacks on embedded microprocessors[J].IEEE Transactions on Computers,2018,67(3):307-321.doi:10.1109/TC.2017.2649520.
    [2]JAEHA K and PARK K T.EE6:Can artificial intelligence replace my job?The dawn of a new IC industry with AI[C].2018 IEEE International Solid-State Circuits Conference,San Francisco,USA,2018:531-533.
    [3]WERNER M,UNTERLUGGAUER T,SCHAFFENRATHD,et al.Sponge-based control-flow protection for IoTdevices[C].2018 IEEE European Symposium on Security and Privacy,London,UK,2018:214-226.
    [4]许天燊.万物互联驱动IC产业创新与合作[J].软件和集成电路,2015(6):16-20.XU Tianshen.All things interconnection drives innovation and cooperation in IC industry[J].Software and Integrated Circuits,2015(6):16-20.
    [5]HONG C,KIM S H,KIM J H,et al.A linear-mode LiDARsensor using a multi-channel CMOS transimpedance amplifier array[J].IEEE Sensors Journal,2018,18(17):7032-7040.doi:10.1109/JSEN.2018.2852794.
    [6]BUSE D S,SOMMER C,and DRESSLER F.Demo abstract:Integrating a driving simulator with city-scale VANET simulation for the development of next generation ADAS systems[C].The IEEE INFOCOM 2018-IEEEConference on Computer Communications Workshops,Honolulu,USA,2018:1-2.
    [7]VIJAYAKUMAR A,PATIL V C,HOLCOMB D E,et al.Physical design obfuscation of hardware:A comprehensive Investigation of device and logic-level techniques[J].IEEETransactions on Information Forensics and Security,2017,12(1):64-77.doi:10.1109/TIFS.2016.2601067.
    [8]张跃军,潘钊,汪鹏君,等.基于状态映射的AES算法硬件混淆设计[J].电子与信息学报,2018,40(3):750-757.doi:10.11999/JEIT170556.ZHANG Yuejun,PAN Zhao,WANG Pengjun,et al.Design of hardware obfuscation AES based on state deflection strategy[J].Journal of Electronics&Information Technology,2018,40(3):750-757.doi:10.11999/JEIT170556.
    [9]KOUSHANFAR F.Provably secure active IC metering techniques for piracy avoidance and digital rights management[J].IEEE Transactions on Information Forensics and Security,2012,7(1):51-63.doi:10.1109/TIFS.2011.2163307.
    [10]CHAKRABORTY R S and BHUNIA S.RTL hardware IPprotection using key-based control and data flow obfuscation[C].International Conference on VLSI Design,Bangalore,India,2010:405-410.
    [11]CHAKRABORTY R S and BHUNIA S.HARPOON:An obfuscation-based soc design methodology for hardware protection[J].IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems,2009,28(10):1493-1502.doi:10.1109/TCAD.2009.2028166.
    [12]DOFE J and YU Qiaoyan.Novel dynamic state-deflection method for gate-level design obfuscation[J].IEEETransactions on Computer-Aided Design of Integrated Circuits and Systems,2018,37(2):273-285.doi:10.1109/TCAD.2017.2697960.
    [13]CANETTI R,ROTHBLUM G N,and VARIA M.Theory of Cryptography[M].Berlin,Heidelberg:Springer,2010:72-89.
    [14]CAO Yuan,ZHANG Le,CHANG C H,et al.A low-power hybrid RO PUF with improved thermal stability for lightweight applications[J].IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems,2015,34(7):1143-1147.doi:10.1109/TCAD.2015.2424955.
    [15]ZHANG Jiliang,LIN Yaping,LYU Yongqiang,et al.APUF-FSM binding scheme for FPGA IP protection and pay-per-device licensing[J].IEEE Transactions on Information Forensics and Security,2015,10(6):1137-1150.doi:10.1109/TIFS.2015.2400413.
    [16]张元达.有限群构造[M].北京:科学出版社,1982:203-206.ZHANG Yuanda.Finite Group Construction[M].Beijing:Science Press,1982:203-206.
    [17]LAO Yingjie and PARHI K K.Statistical analysis of MUX-based physical unclonable functions[J].IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems,2014,33(5):649-662.doi:10.1109/TCAD.2013.2296525.
    [18]BO?NJAK L,SRE?J,and BRUMEN B.Brute-force and dictionary attack on hashed real-world passwords[C].The41st International Convention on Information and Communication Technology,Electronics and Microelectronics,Opatija,Croatia,2018:1161-1166.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700