On Reverse Engineering of Encrypted High Level Synthesis Designs
Various technical and business challenges make it difficult for every IC company to own and maintain its own foundry. This makes the role of third party foundries very important. Since, the fabrication process involves significant third party handling, the IC design is exposed to various risks and v...
Saved in:
Main Author: | |
---|---|
Format: | Dissertation |
Language: | English |
Published: |
ProQuest Dissertations & Theses
01-01-2018
|
Subjects: | |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Abstract | Various technical and business challenges make it difficult for every IC company to own and maintain its own foundry. This makes the role of third party foundries very important. Since, the fabrication process involves significant third party handling, the IC design is exposed to various risks and vulnerabilities. The designers send GDSII layout to different foundries for fabrication. In this process there is a huge possibility of presence of malicious foundries, which account for overproduction, counterfeit, theft or inserting trojans. Over the time, significant amount of research has been done to overcome these issues in hardware security. With increased popularity of High-level synthesis, a lot of research is being done for hardware security in high level synthesis. Furthermore, this research can be divided into three main streams, namely, designing an attack methodology, developing attack prevention methods and detecting an inserted trojan. Under 'designing an attack methodology', one state-of-the-art attack claims to decrypt the finite state machine of a design developed through High-level synthesis flow by using Boolean Satisfiability (SAT). This attack formulates a SAT problem by using high level synthesis design constraints, and recovers the correct finite state machine. Few countermeasures have been developed for this threat model which try to harden the FSM of the design in different ways. One of the countermeasures uses decoys to harden the design's finite state machine.The aim of our thesis is to develop a method to decrypt designs with decoy based countermeasure. For our experimentation we used yet another state-of-the-art SAT attack. This SAT attack was originally designed to unlock an encrypted logic design. We used few different approaches to recover the control flow graph of the decoy-encrypted designs. We tried to increase efficiency of SAT attack on our designs by introducing random input patterns and dividing the design into multiple blocks using scan chain configurations. |
---|---|
AbstractList | Various technical and business challenges make it difficult for every IC company to own and maintain its own foundry. This makes the role of third party foundries very important. Since, the fabrication process involves significant third party handling, the IC design is exposed to various risks and vulnerabilities. The designers send GDSII layout to different foundries for fabrication. In this process there is a huge possibility of presence of malicious foundries, which account for overproduction, counterfeit, theft or inserting trojans. Over the time, significant amount of research has been done to overcome these issues in hardware security. With increased popularity of High-level synthesis, a lot of research is being done for hardware security in high level synthesis. Furthermore, this research can be divided into three main streams, namely, designing an attack methodology, developing attack prevention methods and detecting an inserted trojan. Under 'designing an attack methodology', one state-of-the-art attack claims to decrypt the finite state machine of a design developed through High-level synthesis flow by using Boolean Satisfiability (SAT). This attack formulates a SAT problem by using high level synthesis design constraints, and recovers the correct finite state machine. Few countermeasures have been developed for this threat model which try to harden the FSM of the design in different ways. One of the countermeasures uses decoys to harden the design's finite state machine.The aim of our thesis is to develop a method to decrypt designs with decoy based countermeasure. For our experimentation we used yet another state-of-the-art SAT attack. This SAT attack was originally designed to unlock an encrypted logic design. We used few different approaches to recover the control flow graph of the decoy-encrypted designs. We tried to increase efficiency of SAT attack on our designs by introducing random input patterns and dividing the design into multiple blocks using scan chain configurations. |
Author | Joshi, Manasi |
Author_xml | – sequence: 1 givenname: Manasi surname: Joshi fullname: Joshi, Manasi |
BookMark | eNqNiskKwjAURQMqOPUfAq6FNKkddoJWuhAEdV8cXtNIeal5rdC_Nws_wM25HO6ZszFahBELsiQN4zTJVCwjMWUBkbkLITKlRCRnbHtCfoYPOAKeozYI4AxqbiuvDze0HTx5YXTNj75q-GXArgYyxPeeGmnJJtWtIQh-u2CrQ37dFevW2XcP1JUv2zv0VylVuAmllKlU_1VfHmU7bg |
ContentType | Dissertation |
Copyright | Database copyright ProQuest LLC; ProQuest does not claim copyright in the individual underlying works. |
Copyright_xml | – notice: Database copyright ProQuest LLC; ProQuest does not claim copyright in the individual underlying works. |
DBID | 053 0BH 0MO CBPLH EU9 G20 M8- PQEST PQQKQ PQUKI |
DatabaseName | Dissertations & Theses Europe Full Text: Science & Technology ProQuest Dissertations and Theses Professional Dissertations & Theses @ University of Cincinnati ProQuest Dissertations & Theses Global: The Sciences and Engineering Collection ProQuest Dissertations & Theses A&I ProQuest Dissertations & Theses Global ProQuest Dissertations and Theses A&I: The Sciences and Engineering Collection ProQuest One Academic Eastern Edition (DO NOT USE) ProQuest One Academic ProQuest One Academic UKI Edition |
DatabaseTitle | Dissertations & Theses Europe Full Text: Science & Technology ProQuest One Academic UKI Edition Dissertations & Theses @ University of Cincinnati ProQuest One Academic Eastern Edition ProQuest Dissertations & Theses Global: The Sciences and Engineering Collection ProQuest Dissertations and Theses Professional ProQuest One Academic ProQuest Dissertations & Theses A&I ProQuest Dissertations and Theses A&I: The Sciences and Engineering Collection ProQuest Dissertations & Theses Global |
DatabaseTitleList | Dissertations & Theses Europe Full Text: Science & Technology |
Database_xml | – sequence: 1 dbid: G20 name: ProQuest Dissertations & Theses Global url: https://www.proquest.com/pqdtglobal1 sourceTypes: Aggregation Database |
DeliveryMethod | fulltext_linktorsrc |
Genre | Dissertation/Thesis |
GroupedDBID | 053 0BH 0MO 8R4 8R5 CBPLH EU9 G20 M8- PQEST PQQKQ PQUKI Q2X |
ID | FETCH-proquest_journals_23151222823 |
IEDL.DBID | G20 |
ISBN | 9781687936240 1687936242 |
IngestDate | Thu Oct 10 17:51:47 EDT 2024 |
IsPeerReviewed | false |
IsScholarly | false |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-proquest_journals_23151222823 |
PQID | 2315122282 |
PQPubID | 18750 |
ParticipantIDs | proquest_journals_2315122282 |
PublicationCentury | 2000 |
PublicationDate | 20180101 |
PublicationDateYYYYMMDD | 2018-01-01 |
PublicationDate_xml | – month: 01 year: 2018 text: 20180101 day: 01 |
PublicationDecade | 2010 |
PublicationYear | 2018 |
Publisher | ProQuest Dissertations & Theses |
Publisher_xml | – name: ProQuest Dissertations & Theses |
SSID | ssib000933042 |
Score | 3.6630905 |
Snippet | Various technical and business challenges make it difficult for every IC company to own and maintain its own foundry. This makes the role of third party... |
SourceID | proquest |
SourceType | Aggregation Database |
SubjectTerms | Electrical engineering |
Title | On Reverse Engineering of Encrypted High Level Synthesis Designs |
URI | https://www.proquest.com/docview/2315122282 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://sdu.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwY2BQMTQ2N7ZMNjfXTQQ2LnRNzJIsdROBKUPXMjUl1SIpMdHCKAm0Udgj2NwvwsLFFXRMjh1sLwxoWSWsTAQX1Cn5yaAxcn1gOwRYNxkBewj2BYW6oFujQLOr0Cs0mBlYQQedga9uQG7-wHvrhmYWwIQI2gsBPeYJxjfAKIPBFYubAKVOEmTgcUGaURdiYErNE2Fw8M9TCEoFLbhIVUA6cFAhPw3ITS6qLAA2MxVAKzwUfEBrhhSCK_OA7cDizGIFF_CCjmJRBmU31xBnD12Yi-Khaa44HuEcYzEGlrz8vFQJBgXztCQjE1ODlLQUE2DXKdkiydzYCFiipRgZJycnm5maSjLI4DNJCr-0NAMXsAFhARmSkGFgKSkqTZVlYC5OKZUDxwQA6L6WfQ |
link.rule.ids | 312,782,786,787,11657,11697,34256,34258,44058,74582,79430 |
linkProvider | ProQuest |
linkToHtml | http://sdu.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwY2BQMTQ2N7ZMNjfXTQQ2LnRNzJIsdROBKUPXMjUl1SIpMdHCKAm0Udgj2NwvwsLFFXRMjh1sLwxoWSWsTAQX1Cn5yaAxcn1gOwRYNxkBewj2BYW6oFujQLOr0Cs0mBlYTYAtD9CSLnfk5g-8t25oZgFMiKC9ENBjnmB8A4wyGFyxuAlQ6iRBBh4XpBl1IQam1DwRBgf_PIWgVNCCi1QFpAMHFfLTgNzkosoCYDNTAbTCQ8EHtGZIIbgyD9gOLM4sVnABL-goFmVQdnMNcfbQhbkoHprmiuMRzjEWY2DJy89LlWBQME9LMjIxNUhJSzEBdp2SLZLMjY2AJVqKkXFycrKZqakkgww-k6TwS8szcHqE-PrE-3j6eUszcAEbExaQ4QkZBpaSotJUWQbm4pRSOXCsAAAXBZll |
linkToPdf | http://sdu.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1LS8NAEB5sBREPKio-qi7odWmb125OCqahaqliPXgL2UfAS1Ibe-i_dyYmGhB68jgsLLPsMPvNzDezANdDV7ihFoKnCC64F6iQp2gZPLTGSpWm0lHUKDyeiembjEY0Jueh6YUhWmXjEytHbQpNOfI-4hB8mxyMEPpZTYt4juKb-QenH6So0lp_p9GBTUHFIGr8bUOhn8h9GEg0SuqLqEc-NfLgjz-uHpl49z_V24OdqFVp34cNmx_A7VPOXiwRMSxrDSJkRYaiXqzmCD8ZMT_YhLhEbLbKER-W7yWLKqJHeQhX8ej1bswb7ZLaFsvkVzX3CLp5kdtjYCJTjucPTGY8DKm0VMJ10NMZx9VaB75_Ar11O52uX76ELTx9MrmfPp7BNmIM-Z216EH3c7G059ApzfKiuqAvOZWiKA |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Adissertation&rft.genre=dissertation&rft.title=On+Reverse+Engineering+of+Encrypted+High+Level+Synthesis+Designs&rft.DBID=053%3B0BH%3B0MO%3BCBPLH%3BEU9%3BG20%3BM8-%3BPQEST%3BPQQKQ%3BPQUKI&rft.PQPubID=18750&rft.au=Joshi%2C+Manasi&rft.date=2018-01-01&rft.pub=ProQuest+Dissertations+%26+Theses&rft.isbn=9781687936240&rft.externalDBID=HAS_PDF_LINK |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781687936240/lc.gif&client=summon&freeimage=true |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781687936240/mc.gif&client=summon&freeimage=true |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781687936240/sc.gif&client=summon&freeimage=true |