A New Optimal Method for the Secure Design of Combinational Circuits against Hardware Trojans Using Interference Logic Locking
Effective resistance to intellectual property theft, reverse engineering, and hardware Trojan insertion in integrated circuit supply chains is increasingly essential, for which many solutions have been proposed. Accordingly, strong attacks are also designed in this field. One way to achieve the abov...
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2023-02-01
|
Series: | Electronics |
Subjects: | |
Online Access: | https://www.mdpi.com/2079-9292/12/5/1107 |
_version_ | 1797615557815566336 |
---|---|
author | Zahra Mirmohammadi Shahram Etemadi Borujeni |
author_facet | Zahra Mirmohammadi Shahram Etemadi Borujeni |
author_sort | Zahra Mirmohammadi |
collection | DOAJ |
description | Effective resistance to intellectual property theft, reverse engineering, and hardware Trojan insertion in integrated circuit supply chains is increasingly essential, for which many solutions have been proposed. Accordingly, strong attacks are also designed in this field. One way to achieve the above goal is obfuscation. The hardware obfuscation method hides the primary function of the circuit and the normal Netlist from the attacker by adding several key gates in the original Netlist. The functionality circuit is correct only if the correct key is applied; otherwise, the circuit is obfuscated. In recent years, various obfuscation methods have been proposed. One is logic locking, the most prominent hardware protection technique since it can protect against untrusted items. Logic locking induces functional and structural changes to a design even before the layout generation. We secured the circuit against hardware Trojan insertion with a secure logic locking method based on the insertion of key gates in interference mode. We call our proposed method Secure Interference Logic Locking, SILL. SILL is based on minimum controllability in paths with maximum fan-out. In this method, we have reduced the number of key gates required for circuit obfuscation and created the maximum Hamming distance between normal and obscure outputs. In addition, the key gates are added to the circuit’s complete interference, and the AES algorithm is used to generate the key. Our proposed method, SILL, was simulated in the Vivado simulation environment; the algorithms used in this method were prepared in VHDL language and designed to allow parallel execution, then applied on the original Netlist of the ISCAS85 benchmark circuits. By analyzing and comparing the results of this simulation to recent works, the amount of hardware consumption has decreased (about 5% space consumption and about a 0.15-nanosecond time delay). Then, the SAT attack algorithm was tested on ISCAS85 benchmark circuits that were obfuscated with SILL. The execution time of the attack in the second attempt was 0.24 nanoseconds longer compared to similar recent works, and it timed out in the fourth attempt. The resistance of our proposed method, having less hardware overhead and higher speed is more effective against SAT attacks than the existing conventional methods. |
first_indexed | 2024-03-11T07:28:14Z |
format | Article |
id | doaj.art-fbcb8462229d4c1eaff9d15b01ee67b1 |
institution | Directory Open Access Journal |
issn | 2079-9292 |
language | English |
last_indexed | 2024-03-11T07:28:14Z |
publishDate | 2023-02-01 |
publisher | MDPI AG |
record_format | Article |
series | Electronics |
spelling | doaj.art-fbcb8462229d4c1eaff9d15b01ee67b12023-11-17T07:31:45ZengMDPI AGElectronics2079-92922023-02-01125110710.3390/electronics12051107A New Optimal Method for the Secure Design of Combinational Circuits against Hardware Trojans Using Interference Logic LockingZahra Mirmohammadi0Shahram Etemadi Borujeni1Faculty of Computer Engineering, University of Isfahan, Isfahan 8174673441, IranFaculty of Computer Engineering, University of Isfahan, Isfahan 8174673441, IranEffective resistance to intellectual property theft, reverse engineering, and hardware Trojan insertion in integrated circuit supply chains is increasingly essential, for which many solutions have been proposed. Accordingly, strong attacks are also designed in this field. One way to achieve the above goal is obfuscation. The hardware obfuscation method hides the primary function of the circuit and the normal Netlist from the attacker by adding several key gates in the original Netlist. The functionality circuit is correct only if the correct key is applied; otherwise, the circuit is obfuscated. In recent years, various obfuscation methods have been proposed. One is logic locking, the most prominent hardware protection technique since it can protect against untrusted items. Logic locking induces functional and structural changes to a design even before the layout generation. We secured the circuit against hardware Trojan insertion with a secure logic locking method based on the insertion of key gates in interference mode. We call our proposed method Secure Interference Logic Locking, SILL. SILL is based on minimum controllability in paths with maximum fan-out. In this method, we have reduced the number of key gates required for circuit obfuscation and created the maximum Hamming distance between normal and obscure outputs. In addition, the key gates are added to the circuit’s complete interference, and the AES algorithm is used to generate the key. Our proposed method, SILL, was simulated in the Vivado simulation environment; the algorithms used in this method were prepared in VHDL language and designed to allow parallel execution, then applied on the original Netlist of the ISCAS85 benchmark circuits. By analyzing and comparing the results of this simulation to recent works, the amount of hardware consumption has decreased (about 5% space consumption and about a 0.15-nanosecond time delay). Then, the SAT attack algorithm was tested on ISCAS85 benchmark circuits that were obfuscated with SILL. The execution time of the attack in the second attempt was 0.24 nanoseconds longer compared to similar recent works, and it timed out in the fourth attempt. The resistance of our proposed method, having less hardware overhead and higher speed is more effective against SAT attacks than the existing conventional methods.https://www.mdpi.com/2079-9292/12/5/1107hardware Trojanshardware obfuscationlogic lockingkey interferenceconvergence |
spellingShingle | Zahra Mirmohammadi Shahram Etemadi Borujeni A New Optimal Method for the Secure Design of Combinational Circuits against Hardware Trojans Using Interference Logic Locking Electronics hardware Trojans hardware obfuscation logic locking key interference convergence |
title | A New Optimal Method for the Secure Design of Combinational Circuits against Hardware Trojans Using Interference Logic Locking |
title_full | A New Optimal Method for the Secure Design of Combinational Circuits against Hardware Trojans Using Interference Logic Locking |
title_fullStr | A New Optimal Method for the Secure Design of Combinational Circuits against Hardware Trojans Using Interference Logic Locking |
title_full_unstemmed | A New Optimal Method for the Secure Design of Combinational Circuits against Hardware Trojans Using Interference Logic Locking |
title_short | A New Optimal Method for the Secure Design of Combinational Circuits against Hardware Trojans Using Interference Logic Locking |
title_sort | new optimal method for the secure design of combinational circuits against hardware trojans using interference logic locking |
topic | hardware Trojans hardware obfuscation logic locking key interference convergence |
url | https://www.mdpi.com/2079-9292/12/5/1107 |
work_keys_str_mv | AT zahramirmohammadi anewoptimalmethodforthesecuredesignofcombinationalcircuitsagainsthardwaretrojansusinginterferencelogiclocking AT shahrametemadiborujeni anewoptimalmethodforthesecuredesignofcombinationalcircuitsagainsthardwaretrojansusinginterferencelogiclocking AT zahramirmohammadi newoptimalmethodforthesecuredesignofcombinationalcircuitsagainsthardwaretrojansusinginterferencelogiclocking AT shahrametemadiborujeni newoptimalmethodforthesecuredesignofcombinationalcircuitsagainsthardwaretrojansusinginterferencelogiclocking |