Paper 2021/295

Enhancing Processor Design Obfuscation Through Security-Aware On-Chip Memory and Data Path Design

Michael Zuzak and Ankur Srivastava

Abstract

A sizable body of work has identified the importance of architecture and application level security when using logic locking, a family of module level supply chain security techniques, to secure processor ICs. However, prior logic locking research proposes configuring logic locking using only module level considerations. To begin our work, we perform a systematic design space exploration of logic locking in modules throughout a processor IC. This exploration shows that locking with only module level considerations cannot guarantee architecture/application level security, regardless of the locking technique used. To remedy this, we propose a tool-driven security-aware approach to enhance the 2 most effective candidate locking locations, on-chip memory and data path. We show that through minor design modifications of the on-chip memory and data path architecture, one can exponentially improve the architecture/application level security of prior locking art with only a modest design overhead. Underlying our design space exploration and security-aware design approach is ObfusGEM, an open-source logic locking simulation framework released with this work to quantitatively evaluate the architectural effectiveness of logic locking in custom processor architecture configurations.

Metadata
Available format(s)
PDF
Category
Implementation
Publication info
Published elsewhere. MEMSYS '20: Proceedings of the International Symposium on Memory Systems
DOI
10.1145/3422575.3422798
Keywords
ObfusGEMProcessor Design ObfuscationOn-Chip Memory DesignLogic LockingUntrusted FoundryIP Piracy
Contact author(s)
mzuzak @ umd edu
History
2021-03-07: received
Short URL
https://ia.cr/2021/295
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2021/295,
      author = {Michael Zuzak and Ankur Srivastava},
      title = {Enhancing Processor Design Obfuscation Through Security-Aware On-Chip Memory and Data Path Design},
      howpublished = {Cryptology ePrint Archive, Paper 2021/295},
      year = {2021},
      doi = {10.1145/3422575.3422798},
      note = {\url{https://eprint.iacr.org/2021/295}},
      url = {https://eprint.iacr.org/2021/295}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.