학술논문

Obfuscation Technique to Protect the Hardware IP Piracy
Document Type
Conference
Source
2023 7th International Conference on Computing Methodologies and Communication (ICCMC) Computing Methodologies and Communication (ICCMC), 2023 7th International Conference on. :1195-1198 Feb, 2023
Subject
Communication, Networking and Broadcast Technologies
Components, Circuits, Devices and Systems
Computing and Processing
Robotics and Control Systems
Signal Processing and Analysis
Integrated circuits
TV
Reverse engineering
Logic gates
Benchmark testing
Encryption
IP networks
Counterfeiting
Piracy
Obfuscation
Language
Abstract
In today's world, the need for technical components is essential. The integral part of the technical components is ICs. ICs are the integrated circuits that consist of millions of transistors that remain as the backbone of technical products such as Computers, TV, Washing machine, Laptops, Phones, Air Cooler etc. These products play an important role in human's daily life. The ICs that are used in these products should be properly secured in order to give the credits to the rightful owner of the IC. Thus, the hardware IPs are most important. But the attackers clone these ICs and illegally supply these ICs in another brand name, which has to be controlled. Objectives and challenges are quite different from each other. Encryption in Xilinx and Altera, and chemicals on chip are also used in military devices. Obfuscation done in various design phases making reverse engineering is much more difficult. Obfuscation technique is less cost compared to chemical on chip. Compared to encryption the obfuscation is more effective because encrypting some or all of a program's code is one obfuscation method. Thus, this paper discusses about the obfuscation technique to protect the hardware IP from counterfeits. Making the functionality of the original product to be same, but changing the circuit using gate-level net list obfuscation technique, making it difficult to retrace the functional keys for obfuscated circuit and protecting the hardware IP are also important. For all the benchmark circuits, obfuscation technique is employed. When the correct key is given, the obfuscated circuit exhibits the original functionality of the circuit and gives the correct output. For the wrong key given, the circuit exhibits the wrong functionality and the output came wrong. Delay is compared and analysed between the original circuit, existing methodology, proposed methodology and obfuscated circuits. The proposed obfuscation cell when added to the circuits produces low power overheads. The security is increased square times when compared to the existing obfuscation technique.