๐”– Scriptorium
โœฆ   LIBER   โœฆ

๐Ÿ“

A Synergistic Framework for Hardware IP Privacy and Integrity Protection

โœ Scribed by Meng Li, David Z. Pan


Publisher
Springer
Year
2020
Tongue
English
Leaves
147
Edition
1st ed. 2020
Category
Library

โฌ‡  Acquire This Volume

No coin nor oath required. For personal study only.

โœฆ Synopsis


This book proposes a synergistic framework to help IP vendors to protect hardware IP privacy and integrity from design, optimization, and evaluation perspectives. The proposed framework consists of five interacting components that directly target at the primary IP violations. All the five algorithms are developed based on rigorous mathematical modeling for primary IP violations and focus on different stages of IC design, which can be combined to provide a formal security guarantee.

โœฆ Table of Contents


Preface
Contents
Acronyms
1 Introduction
1.1 Hardware IP Privacy and Integrity Challenges
1.2 Overview of This Book
References
2 Practical Split Manufacturing Optimization
2.1 Introduction
2.2 Preliminary
2.2.1 Attack Model of Untrusted Foundries
2.2.2 Motivating Example
2.2.3 State-of-the-Art Split Manufacturing Flow
2.3 Split Manufacturing Security Analysis
2.4 k-Security Realization
2.5 Practical Framework for Trojan Prevention
2.5.1 MILP-Based FEOL Generation
2.5.2 Lagrangian Relaxation Algorithm
Minimum-Cost Flow Transformation
Lagrangian Multiplier Update
2.5.3 k-Secure Layout Refinement
2.6 Experimental Results
2.6.1 Experimental Setup
2.6.2 FEOL Generation Strategy Comparison
2.6.3 Physical Synthesis Comparison
2.6.4 Physical Proximity Examination
2.6.5 Relation Between Overhead and Framework Parameters
2.7 Summary
References
3 IC Camouflaging Optimization and Evaluation
3.1 Introduction
3.2 ``Arms Race'' Evolution
3.3 Provably Secure IC Camouflaging
3.3.1 Preliminary: Active Learning
3.3.2 IC Camouflaging Security Analysis
3.3.3 Novel Camouflaging Cell Design
XOR-Type Cell Camouflaging Strategy
STF-Type Cell Camouflaging Strategy
Discussion
3.3.4 AND-Tree Camouflaging Strategy
Security Analysis of the AND-Tree Structure
AND-Tree Structure in General Circuits
Input Bias Evaluation
Tree Decomposability Characterization
3.3.5 Provably Secure IC Camouflaging
AND-Tree Detection in Original Netlist
Stochastic Greedy AND-Tree Insertion
AND-Tree Camouflaging Against Removal Attack
Comparison Between State-of-the-Art Techniques
3.3.6 Experimental Results
Verification of Camouflaging Cell Generation Strategy
Evaluation of AND-Tree Based Camouflaging Strategy
Impact of Structural and Functional Camouflaging
Effectiveness of Combination of Two Camouflaging Strategies
3.3.7 Summary
3.4 De-camouflaging Timing-Based Logic Obfuscation
3.4.1 Preliminary: Timing-Based Camouflaging
3.4.2 A Motivating Example
3.4.3 TimingSAT Framework
TU Insertion
Determine Input Query Through Unrolling
Netlist Simplification for De-camouflaging Acceleration
Key Post-processing
Discussion
3.4.4 Experimental Results
Efficiency of TimingSAT
Runtime Dependency of TimingSAT
Impact of Unrolling Time Frames
De-camouflaging of Combination of Timing-Based and Traditional Strategy
3.4.5 Summary
References
4 Fault Attack Protection and Evaluation
4.1 Introduction
4.2 Practical PPUF Design
4.2.1 Preliminaries
PPUF-Based Protocol
Max-Flow Problem in Directed Graph
Signal Delay in General Circuit
4.2.2 PPUF Topology and ESG Analysis
PPUF Topology and Basic Building Block
Lower Bound of PPUF Simulation
Upper Bound of PPUF Execution
ESG Amplification
Speeding Up Verifier's Task
4.2.3 PPUF Physical Realization
Complete Crossbar Structure
Interleaving Crossbar Placement
Input Challenge Pre-pruning
4.2.4 Experimental Results
Verification of Simulation Model and ESG
Verification of PPUF Practicality
PPUF Statistical Evaluation
Model-Building Attack Resilience
4.2.5 Summary
4.3 Cross-Level Monte Carlo Evaluation Framework
4.3.1 Motivation
4.3.2 Problem Formulation
Attack Model
Holistic Fault Injection Modeling
System Security Factor
4.3.3 Importance Sampling via System Pre-characterization
4.3.4 Cross-Level Fault Propagation Simulation
RTL-Level Golden Simulation
RTL-Level Fault Attack Simulation
Gate-Level Fault Attack Modeling
4.3.5 Experimental Results
4.3.6 Summary
References
5 Conclusion and Future Work
Index


๐Ÿ“œ SIMILAR VOLUMES


Foundations of Hardware IP Protection
โœ Lilian Bossuet, Lionel Torres (eds.) ๐Ÿ“‚ Library ๐Ÿ“… 2017 ๐Ÿ› Springer International Publishing ๐ŸŒ English

<p><p>This book provides a comprehensive and up-to-date guide to the design of security-hardened, hardware intellectual property (IP). Readers will learn how IP can be threatened, as well as protected, by using means such as hardware obfuscation/camouflaging, watermarking, fingerprinting (PUF), func

Mastering Project Management Integration
โœ Dietmar Sokowski ๐Ÿ“‚ Library ๐Ÿ“… 2015 ๐Ÿ› Pearson FT Press ๐ŸŒ English

<B> <I> <P style="MARGIN: 0px">Mastering Project Management Integration and Scope </B> </I>gives managers powerful insights and tools for addressing the most crucial success factor in any project: completely and accurately defining project objectives and deliverables, and transforming your definiti

Protecting Individual Privacy in the Str
โœ National Academies Press ๐Ÿ“‚ Library ๐Ÿ“… 2008 ๐ŸŒ English

All U.S. agencies with counterterrorism programs that collect or 'mine' personal data - such as phone records or Web sites visited - should be required to evaluate the programs' effectiveness, lawfulness, and impacts on privacy. A framework is offered that agencies can use to evaluate such informati