Numerous threats are associated with the globalized integrated circuit (IC) supply chain, such as piracy, reverse engineering, overproduction, and malicious logic insertion. Many obfuscation approaches have been proposed to mitigate these threats by preventing an adversary from fully understanding the IC (or parts of it). The use of reconfigurable elements inside an IC is a known obfuscation technique, either as a coarse grain reconfigurable block (i.e., eFPGA) or as a fine grain element (i.e., FPGA-like look-up tables). This paper presents a security-aware CAD flow that is LUT-based yet still compatible with the standard cell based physical synthesis flow. More precisely, our CAD flow explores the FPGA-ASIC design space and produces heavily obfuscated designs where only small portions of the logic resemble an ASIC. Therefore, we term this specialized solution an "embedded ASIC" (eASIC). Nevertheless, even for heavily LUT-dominated designs, our proposed decomposition and pin swapping algorithms allow for performance gains that enable performance levels that only ASICs would otherwise achieve. On the security side, we have developed novel template-based attacks and also applied existing attacks, both oracle-free and oracle-based. Our security analysis revealed that the obfuscation rate for an SHA-256 study case should be at least 45% for withstanding traditional attacks and at least 80% for withstanding template-based attacks. When the 80\% obfuscated SHA-256 design is physically implemented, it achieves a remarkable frequency of 368MHz in a 65nm commercial technology, whereas its FPGA implementation (in a superior technology) achieves only 77MHz.
翻译:与全球化综合电路(IC)供应链相关的许多威胁都与全球化综合电路(IC)供应链相关,例如海盗、逆向工程、生产过度和恶意逻辑插入。许多模糊的方法已经提出,通过防止对手完全理解IC(或其中某些部分)来减轻这些威胁。在IC(IC)内部使用可重新配置的元素是一种众所周知的模糊技术,要么是一种粗糙的谷物可重新配置块(即eFPGA),要么是一种细微的谷物元素(即,FPGA(类似FPGA)的平板图 ) 。然而,本文展示了一种安全觉悟的CADAD流,以LUT为基础,但依然与标准的基于物理合成单元的CEVS-2攻击兼容。更确切地说,我们的CADADA流动探索了FGA-AS设计空间,产生了非常模糊的设计,其中只有一小部分的逻辑可以与ASIC(eAS)相似。因此,我们将这种专门解决方案称为“封装ASICE(eAS)(eAS) (eASIC) (eAS) (eAIC) (时间段) 。然而,即使重 LUT(flod LUT)为主控设计,我们拟议的解和侧算算算也使得基于的CADal-c) 3-xalsalxaction(SDA) 也能够实现了80-calmasural) 和SA(SB) 的80-c) 的SB) 的SBas-salevalevalevalupalusalusalsalsal 实现了一种基于的运行的运行的操作性攻击和SA 。