A Key Based Obfuscation and Anonymization of Behavior VHDL Models
Intellectual Property (IP) based Integrated Circuit (IC) design is an established approach for the design of a complex System-on-Chip (SoC). Porting the preparatory designs to third-party without enough security margin exposes an attacker to perform reverse engineering (RE) on the designs and hence...
Main Author: | |
---|---|
Format: | Others |
Published: |
Scholar Commons
2018
|
Subjects: | |
Online Access: | https://scholarcommons.usf.edu/etd/7686 https://scholarcommons.usf.edu/cgi/viewcontent.cgi?article=8883&context=etd |
id |
ndltd-USF-oai-scholarcommons.usf.edu-etd-8883 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-USF-oai-scholarcommons.usf.edu-etd-88832019-10-05T04:49:03Z A Key Based Obfuscation and Anonymization of Behavior VHDL Models Kandikonda, Balausha Varshini Intellectual Property (IP) based Integrated Circuit (IC) design is an established approach for the design of a complex System-on-Chip (SoC). Porting the preparatory designs to third-party without enough security margin exposes an attacker to perform reverse engineering (RE) on the designs and hence counterfeiting, IP theft etc., are common now-a-days. Design obfuscation can reduce RE attempt by an attacker. In this work, we propose a key based obfuscation and anonymization method for a behavioral IP. Given a behavioral VHDL description, the assignment and conditional statements are modified by incorporating random boolean operations with unique random key bits. The obfuscated VHDL is then anonymized by random identifiers. The resultant behavioral model can be simulated correctly upon application of original key sequence. Simulation results with nine datapath intensive benchmarks with three different lengths of test sequences show that the simulation overhead is negligible (only a few seconds). We evaluate the probability of reverse engineering the obfuscated design and show that it is extremely low. 2018-06-22T07:00:00Z text application/pdf https://scholarcommons.usf.edu/etd/7686 https://scholarcommons.usf.edu/cgi/viewcontent.cgi?article=8883&context=etd Graduate Theses and Dissertations Scholar Commons Intellectual Property Overhead Resilience Reverse Engineer Trojan Horse Computer Sciences |
collection |
NDLTD |
format |
Others
|
sources |
NDLTD |
topic |
Intellectual Property Overhead Resilience Reverse Engineer Trojan Horse Computer Sciences |
spellingShingle |
Intellectual Property Overhead Resilience Reverse Engineer Trojan Horse Computer Sciences Kandikonda, Balausha Varshini A Key Based Obfuscation and Anonymization of Behavior VHDL Models |
description |
Intellectual Property (IP) based Integrated Circuit (IC) design is an established approach for the design of a complex System-on-Chip (SoC). Porting the preparatory designs to third-party without enough security margin exposes an attacker to perform reverse engineering (RE) on the designs and hence counterfeiting, IP theft etc., are common now-a-days. Design obfuscation can reduce RE attempt by an attacker. In this work, we propose a key based obfuscation and anonymization method for a behavioral IP. Given a behavioral VHDL description, the assignment and conditional statements are modified by incorporating random boolean operations with unique random key bits. The obfuscated VHDL is then anonymized by random identifiers. The resultant behavioral model can be simulated correctly upon application of original key sequence. Simulation results with nine datapath intensive benchmarks with three different lengths of test sequences show that the simulation overhead is negligible (only a few seconds). We evaluate the probability of reverse engineering the obfuscated design and show that it is extremely low. |
author |
Kandikonda, Balausha Varshini |
author_facet |
Kandikonda, Balausha Varshini |
author_sort |
Kandikonda, Balausha Varshini |
title |
A Key Based Obfuscation and Anonymization of Behavior VHDL Models |
title_short |
A Key Based Obfuscation and Anonymization of Behavior VHDL Models |
title_full |
A Key Based Obfuscation and Anonymization of Behavior VHDL Models |
title_fullStr |
A Key Based Obfuscation and Anonymization of Behavior VHDL Models |
title_full_unstemmed |
A Key Based Obfuscation and Anonymization of Behavior VHDL Models |
title_sort |
key based obfuscation and anonymization of behavior vhdl models |
publisher |
Scholar Commons |
publishDate |
2018 |
url |
https://scholarcommons.usf.edu/etd/7686 https://scholarcommons.usf.edu/cgi/viewcontent.cgi?article=8883&context=etd |
work_keys_str_mv |
AT kandikondabalaushavarshini akeybasedobfuscationandanonymizationofbehaviorvhdlmodels AT kandikondabalaushavarshini keybasedobfuscationandanonymizationofbehaviorvhdlmodels |
_version_ |
1719262182180388864 |