On Reverse Engineering of Encrypted High Level Synthesis Designs

Various technical and business challenges make it difficult for every IC company to own and maintain its own foundry. This makes the role of third party foundries very important. Since, the fabrication process involves significant third party handling, the IC design is exposed to various risks and v...

Full description

Saved in:
Bibliographic Details
Main Author: Joshi, Manasi
Format: Dissertation
Language:English
Published: ProQuest Dissertations & Theses 01-01-2018
Subjects:
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Abstract Various technical and business challenges make it difficult for every IC company to own and maintain its own foundry. This makes the role of third party foundries very important. Since, the fabrication process involves significant third party handling, the IC design is exposed to various risks and vulnerabilities. The designers send GDSII layout to different foundries for fabrication. In this process there is a huge possibility of presence of malicious foundries, which account for overproduction, counterfeit, theft or inserting trojans. Over the time, significant amount of research has been done to overcome these issues in hardware security. With increased popularity of High-level synthesis, a lot of research is being done for hardware security in high level synthesis. Furthermore, this research can be divided into three main streams, namely, designing an attack methodology, developing attack prevention methods and detecting an inserted trojan. Under 'designing an attack methodology', one state-of-the-art attack claims to decrypt the finite state machine of a design developed through High-level synthesis flow by using Boolean Satisfiability (SAT). This attack formulates a SAT problem by using high level synthesis design constraints, and recovers the correct finite state machine. Few countermeasures have been developed for this threat model which try to harden the FSM of the design in different ways. One of the countermeasures uses decoys to harden the design's finite state machine.The aim of our thesis is to develop a method to decrypt designs with decoy based countermeasure. For our experimentation we used yet another state-of-the-art SAT attack. This SAT attack was originally designed to unlock an encrypted logic design. We used few different approaches to recover the control flow graph of the decoy-encrypted designs. We tried to increase efficiency of SAT attack on our designs by introducing random input patterns and dividing the design into multiple blocks using scan chain configurations.
AbstractList Various technical and business challenges make it difficult for every IC company to own and maintain its own foundry. This makes the role of third party foundries very important. Since, the fabrication process involves significant third party handling, the IC design is exposed to various risks and vulnerabilities. The designers send GDSII layout to different foundries for fabrication. In this process there is a huge possibility of presence of malicious foundries, which account for overproduction, counterfeit, theft or inserting trojans. Over the time, significant amount of research has been done to overcome these issues in hardware security. With increased popularity of High-level synthesis, a lot of research is being done for hardware security in high level synthesis. Furthermore, this research can be divided into three main streams, namely, designing an attack methodology, developing attack prevention methods and detecting an inserted trojan. Under 'designing an attack methodology', one state-of-the-art attack claims to decrypt the finite state machine of a design developed through High-level synthesis flow by using Boolean Satisfiability (SAT). This attack formulates a SAT problem by using high level synthesis design constraints, and recovers the correct finite state machine. Few countermeasures have been developed for this threat model which try to harden the FSM of the design in different ways. One of the countermeasures uses decoys to harden the design's finite state machine.The aim of our thesis is to develop a method to decrypt designs with decoy based countermeasure. For our experimentation we used yet another state-of-the-art SAT attack. This SAT attack was originally designed to unlock an encrypted logic design. We used few different approaches to recover the control flow graph of the decoy-encrypted designs. We tried to increase efficiency of SAT attack on our designs by introducing random input patterns and dividing the design into multiple blocks using scan chain configurations.
Author Joshi, Manasi
Author_xml – sequence: 1
  givenname: Manasi
  surname: Joshi
  fullname: Joshi, Manasi
BookMark eNqNiskKwjAURQMqOPUfAq6FNKkddoJWuhAEdV8cXtNIeal5rdC_Nws_wM25HO6ZszFahBELsiQN4zTJVCwjMWUBkbkLITKlRCRnbHtCfoYPOAKeozYI4AxqbiuvDze0HTx5YXTNj75q-GXArgYyxPeeGmnJJtWtIQh-u2CrQ37dFevW2XcP1JUv2zv0VylVuAmllKlU_1VfHmU7bg
ContentType Dissertation
Copyright Database copyright ProQuest LLC; ProQuest does not claim copyright in the individual underlying works.
Copyright_xml – notice: Database copyright ProQuest LLC; ProQuest does not claim copyright in the individual underlying works.
DBID 053
0BH
0MO
CBPLH
EU9
G20
M8-
PQEST
PQQKQ
PQUKI
DatabaseName Dissertations & Theses Europe Full Text: Science & Technology
ProQuest Dissertations and Theses Professional
Dissertations & Theses @ University of Cincinnati
ProQuest Dissertations & Theses Global: The Sciences and Engineering Collection
ProQuest Dissertations & Theses A&I
ProQuest Dissertations & Theses Global
ProQuest Dissertations and Theses A&I: The Sciences and Engineering Collection
ProQuest One Academic Eastern Edition (DO NOT USE)
ProQuest One Academic
ProQuest One Academic UKI Edition
DatabaseTitle Dissertations & Theses Europe Full Text: Science & Technology
ProQuest One Academic UKI Edition
Dissertations & Theses @ University of Cincinnati
ProQuest One Academic Eastern Edition
ProQuest Dissertations & Theses Global: The Sciences and Engineering Collection
ProQuest Dissertations and Theses Professional
ProQuest One Academic
ProQuest Dissertations & Theses A&I
ProQuest Dissertations and Theses A&I: The Sciences and Engineering Collection
ProQuest Dissertations & Theses Global
DatabaseTitleList Dissertations & Theses Europe Full Text: Science & Technology
Database_xml – sequence: 1
  dbid: G20
  name: ProQuest Dissertations & Theses Global
  url: https://www.proquest.com/pqdtglobal1
  sourceTypes: Aggregation Database
DeliveryMethod fulltext_linktorsrc
Genre Dissertation/Thesis
GroupedDBID 053
0BH
0MO
8R4
8R5
CBPLH
EU9
G20
M8-
PQEST
PQQKQ
PQUKI
Q2X
ID FETCH-proquest_journals_23151222823
IEDL.DBID G20
ISBN 9781687936240
1687936242
IngestDate Thu Oct 10 17:51:47 EDT 2024
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-proquest_journals_23151222823
PQID 2315122282
PQPubID 18750
ParticipantIDs proquest_journals_2315122282
PublicationCentury 2000
PublicationDate 20180101
PublicationDateYYYYMMDD 2018-01-01
PublicationDate_xml – month: 01
  year: 2018
  text: 20180101
  day: 01
PublicationDecade 2010
PublicationYear 2018
Publisher ProQuest Dissertations & Theses
Publisher_xml – name: ProQuest Dissertations & Theses
SSID ssib000933042
Score 3.6630905
Snippet Various technical and business challenges make it difficult for every IC company to own and maintain its own foundry. This makes the role of third party...
SourceID proquest
SourceType Aggregation Database
SubjectTerms Electrical engineering
Title On Reverse Engineering of Encrypted High Level Synthesis Designs
URI https://www.proquest.com/docview/2315122282
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://sdu.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwY2BQMTQ2N7ZMNjfXTQQ2LnRNzJIsdROBKUPXMjUl1SIpMdHCKAm0Udgj2NwvwsLFFXRMjh1sLwxoWSWsTAQX1Cn5yaAxcn1gOwRYNxkBewj2BYW6oFujQLOr0Cs0mBlYQQedga9uQG7-wHvrhmYWwIQI2gsBPeYJxjfAKIPBFYubAKVOEmTgcUGaURdiYErNE2Fw8M9TCEoFLbhIVUA6cFAhPw3ITS6qLAA2MxVAKzwUfEBrhhSCK_OA7cDizGIFF_CCjmJRBmU31xBnD12Yi-Khaa44HuEcYzEGlrz8vFQJBgXztCQjE1ODlLQUE2DXKdkiydzYCFiipRgZJycnm5maSjLI4DNJCr-0NAMXsAFhARmSkGFgKSkqTZVlYC5OKZUDxwQA6L6WfQ
link.rule.ids 312,782,786,787,11657,11697,34256,34258,44058,74582,79430
linkProvider ProQuest
linkToHtml http://sdu.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwY2BQMTQ2N7ZMNjfXTQQ2LnRNzJIsdROBKUPXMjUl1SIpMdHCKAm0Udgj2NwvwsLFFXRMjh1sLwxoWSWsTAQX1Cn5yaAxcn1gOwRYNxkBewj2BYW6oFujQLOr0Cs0mBlYTYAtD9CSLnfk5g-8t25oZgFMiKC9ENBjnmB8A4wyGFyxuAlQ6iRBBh4XpBl1IQam1DwRBgf_PIWgVNCCi1QFpAMHFfLTgNzkosoCYDNTAbTCQ8EHtGZIIbgyD9gOLM4sVnABL-goFmVQdnMNcfbQhbkoHprmiuMRzjEWY2DJy89LlWBQME9LMjIxNUhJSzEBdp2SLZLMjY2AJVqKkXFycrKZqakkgww-k6TwS8szcHqE-PrE-3j6eUszcAEbExaQ4QkZBpaSotJUWQbm4pRSOXCsAAAXBZll
linkToPdf http://sdu.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1LS8NAEB5sBREPKio-qi7odWmb125OCqahaqliPXgL2UfAS1Ibe-i_dyYmGhB68jgsLLPsMPvNzDezANdDV7ihFoKnCC64F6iQp2gZPLTGSpWm0lHUKDyeiembjEY0Jueh6YUhWmXjEytHbQpNOfI-4hB8mxyMEPpZTYt4juKb-QenH6So0lp_p9GBTUHFIGr8bUOhn8h9GEg0SuqLqEc-NfLgjz-uHpl49z_V24OdqFVp34cNmx_A7VPOXiwRMSxrDSJkRYaiXqzmCD8ZMT_YhLhEbLbKER-W7yWLKqJHeQhX8ej1bswb7ZLaFsvkVzX3CLp5kdtjYCJTjucPTGY8DKm0VMJ10NMZx9VaB75_Ar11O52uX76ELTx9MrmfPp7BNmIM-Z216EH3c7G059ApzfKiuqAvOZWiKA
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Adissertation&rft.genre=dissertation&rft.title=On+Reverse+Engineering+of+Encrypted+High+Level+Synthesis+Designs&rft.DBID=053%3B0BH%3B0MO%3BCBPLH%3BEU9%3BG20%3BM8-%3BPQEST%3BPQQKQ%3BPQUKI&rft.PQPubID=18750&rft.au=Joshi%2C+Manasi&rft.date=2018-01-01&rft.pub=ProQuest+Dissertations+%26+Theses&rft.isbn=9781687936240&rft.externalDBID=HAS_PDF_LINK
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781687936240/lc.gif&client=summon&freeimage=true
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781687936240/mc.gif&client=summon&freeimage=true
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781687936240/sc.gif&client=summon&freeimage=true