On Reverse Engineering of Encrypted High Level Synthesis Designs

Various technical and business challenges make it difficult for every IC company to own and maintain its own foundry. This makes the role of third party foundries very important. Since, the fabrication process involves significant third party handling, the IC design is exposed to various risks and v...

Full description

Saved in:
Bibliographic Details
Main Author: Joshi, Manasi
Format: Dissertation
Language:English
Published: ProQuest Dissertations & Theses 01-01-2018
Subjects:
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Various technical and business challenges make it difficult for every IC company to own and maintain its own foundry. This makes the role of third party foundries very important. Since, the fabrication process involves significant third party handling, the IC design is exposed to various risks and vulnerabilities. The designers send GDSII layout to different foundries for fabrication. In this process there is a huge possibility of presence of malicious foundries, which account for overproduction, counterfeit, theft or inserting trojans. Over the time, significant amount of research has been done to overcome these issues in hardware security. With increased popularity of High-level synthesis, a lot of research is being done for hardware security in high level synthesis. Furthermore, this research can be divided into three main streams, namely, designing an attack methodology, developing attack prevention methods and detecting an inserted trojan. Under 'designing an attack methodology', one state-of-the-art attack claims to decrypt the finite state machine of a design developed through High-level synthesis flow by using Boolean Satisfiability (SAT). This attack formulates a SAT problem by using high level synthesis design constraints, and recovers the correct finite state machine. Few countermeasures have been developed for this threat model which try to harden the FSM of the design in different ways. One of the countermeasures uses decoys to harden the design's finite state machine.The aim of our thesis is to develop a method to decrypt designs with decoy based countermeasure. For our experimentation we used yet another state-of-the-art SAT attack. This SAT attack was originally designed to unlock an encrypted logic design. We used few different approaches to recover the control flow graph of the decoy-encrypted designs. We tried to increase efficiency of SAT attack on our designs by introducing random input patterns and dividing the design into multiple blocks using scan chain configurations.
ISBN:9781687936240
1687936242