A New Optimal Method for the Secure Design of Combinational Circuits against Hardware Trojans Using Interference Logic Locking

Effective resistance to intellectual property theft, reverse engineering, and hardware Trojan insertion in integrated circuit supply chains is increasingly essential, for which many solutions have been proposed. Accordingly, strong attacks are also designed in this field. One way to achieve the abov...

Full description

Bibliographic Details
Main Authors: Zahra Mirmohammadi, Shahram Etemadi Borujeni
Format: Article
Language:English
Published: MDPI AG 2023-02-01
Series:Electronics
Subjects:
Online Access:https://www.mdpi.com/2079-9292/12/5/1107
_version_ 1797615557815566336
author Zahra Mirmohammadi
Shahram Etemadi Borujeni
author_facet Zahra Mirmohammadi
Shahram Etemadi Borujeni
author_sort Zahra Mirmohammadi
collection DOAJ
description Effective resistance to intellectual property theft, reverse engineering, and hardware Trojan insertion in integrated circuit supply chains is increasingly essential, for which many solutions have been proposed. Accordingly, strong attacks are also designed in this field. One way to achieve the above goal is obfuscation. The hardware obfuscation method hides the primary function of the circuit and the normal Netlist from the attacker by adding several key gates in the original Netlist. The functionality circuit is correct only if the correct key is applied; otherwise, the circuit is obfuscated. In recent years, various obfuscation methods have been proposed. One is logic locking, the most prominent hardware protection technique since it can protect against untrusted items. Logic locking induces functional and structural changes to a design even before the layout generation. We secured the circuit against hardware Trojan insertion with a secure logic locking method based on the insertion of key gates in interference mode. We call our proposed method Secure Interference Logic Locking, SILL. SILL is based on minimum controllability in paths with maximum fan-out. In this method, we have reduced the number of key gates required for circuit obfuscation and created the maximum Hamming distance between normal and obscure outputs. In addition, the key gates are added to the circuit’s complete interference, and the AES algorithm is used to generate the key. Our proposed method, SILL, was simulated in the Vivado simulation environment; the algorithms used in this method were prepared in VHDL language and designed to allow parallel execution, then applied on the original Netlist of the ISCAS85 benchmark circuits. By analyzing and comparing the results of this simulation to recent works, the amount of hardware consumption has decreased (about 5% space consumption and about a 0.15-nanosecond time delay). Then, the SAT attack algorithm was tested on ISCAS85 benchmark circuits that were obfuscated with SILL. The execution time of the attack in the second attempt was 0.24 nanoseconds longer compared to similar recent works, and it timed out in the fourth attempt. The resistance of our proposed method, having less hardware overhead and higher speed is more effective against SAT attacks than the existing conventional methods.
first_indexed 2024-03-11T07:28:14Z
format Article
id doaj.art-fbcb8462229d4c1eaff9d15b01ee67b1
institution Directory Open Access Journal
issn 2079-9292
language English
last_indexed 2024-03-11T07:28:14Z
publishDate 2023-02-01
publisher MDPI AG
record_format Article
series Electronics
spelling doaj.art-fbcb8462229d4c1eaff9d15b01ee67b12023-11-17T07:31:45ZengMDPI AGElectronics2079-92922023-02-01125110710.3390/electronics12051107A New Optimal Method for the Secure Design of Combinational Circuits against Hardware Trojans Using Interference Logic LockingZahra Mirmohammadi0Shahram Etemadi Borujeni1Faculty of Computer Engineering, University of Isfahan, Isfahan 8174673441, IranFaculty of Computer Engineering, University of Isfahan, Isfahan 8174673441, IranEffective resistance to intellectual property theft, reverse engineering, and hardware Trojan insertion in integrated circuit supply chains is increasingly essential, for which many solutions have been proposed. Accordingly, strong attacks are also designed in this field. One way to achieve the above goal is obfuscation. The hardware obfuscation method hides the primary function of the circuit and the normal Netlist from the attacker by adding several key gates in the original Netlist. The functionality circuit is correct only if the correct key is applied; otherwise, the circuit is obfuscated. In recent years, various obfuscation methods have been proposed. One is logic locking, the most prominent hardware protection technique since it can protect against untrusted items. Logic locking induces functional and structural changes to a design even before the layout generation. We secured the circuit against hardware Trojan insertion with a secure logic locking method based on the insertion of key gates in interference mode. We call our proposed method Secure Interference Logic Locking, SILL. SILL is based on minimum controllability in paths with maximum fan-out. In this method, we have reduced the number of key gates required for circuit obfuscation and created the maximum Hamming distance between normal and obscure outputs. In addition, the key gates are added to the circuit’s complete interference, and the AES algorithm is used to generate the key. Our proposed method, SILL, was simulated in the Vivado simulation environment; the algorithms used in this method were prepared in VHDL language and designed to allow parallel execution, then applied on the original Netlist of the ISCAS85 benchmark circuits. By analyzing and comparing the results of this simulation to recent works, the amount of hardware consumption has decreased (about 5% space consumption and about a 0.15-nanosecond time delay). Then, the SAT attack algorithm was tested on ISCAS85 benchmark circuits that were obfuscated with SILL. The execution time of the attack in the second attempt was 0.24 nanoseconds longer compared to similar recent works, and it timed out in the fourth attempt. The resistance of our proposed method, having less hardware overhead and higher speed is more effective against SAT attacks than the existing conventional methods.https://www.mdpi.com/2079-9292/12/5/1107hardware Trojanshardware obfuscationlogic lockingkey interferenceconvergence
spellingShingle Zahra Mirmohammadi
Shahram Etemadi Borujeni
A New Optimal Method for the Secure Design of Combinational Circuits against Hardware Trojans Using Interference Logic Locking
Electronics
hardware Trojans
hardware obfuscation
logic locking
key interference
convergence
title A New Optimal Method for the Secure Design of Combinational Circuits against Hardware Trojans Using Interference Logic Locking
title_full A New Optimal Method for the Secure Design of Combinational Circuits against Hardware Trojans Using Interference Logic Locking
title_fullStr A New Optimal Method for the Secure Design of Combinational Circuits against Hardware Trojans Using Interference Logic Locking
title_full_unstemmed A New Optimal Method for the Secure Design of Combinational Circuits against Hardware Trojans Using Interference Logic Locking
title_short A New Optimal Method for the Secure Design of Combinational Circuits against Hardware Trojans Using Interference Logic Locking
title_sort new optimal method for the secure design of combinational circuits against hardware trojans using interference logic locking
topic hardware Trojans
hardware obfuscation
logic locking
key interference
convergence
url https://www.mdpi.com/2079-9292/12/5/1107
work_keys_str_mv AT zahramirmohammadi anewoptimalmethodforthesecuredesignofcombinationalcircuitsagainsthardwaretrojansusinginterferencelogiclocking
AT shahrametemadiborujeni anewoptimalmethodforthesecuredesignofcombinationalcircuitsagainsthardwaretrojansusinginterferencelogiclocking
AT zahramirmohammadi newoptimalmethodforthesecuredesignofcombinationalcircuitsagainsthardwaretrojansusinginterferencelogiclocking
AT shahrametemadiborujeni newoptimalmethodforthesecuredesignofcombinationalcircuitsagainsthardwaretrojansusinginterferencelogiclocking