TY - GEN
T1 - Structural transformation for best-possible obfuscation of sequential circuits
AU - Li, Li
AU - Zhou, Hai
PY - 2013/9/16
Y1 - 2013/9/16
N2 - Obfuscation is a technique that makes comprehending a design difficult and hides the secrets in the design. An obfuscation is called best-possible if the obfuscated design leaks no more information than any other design of the same function. In this paper, we prove that any best-possible obfuscation of a sequential circuit can be accomplished by a sequence of four operations: retiming, resynthesis, sweep, and conditional stuttering. Based on this fundamental result, we also develop a key-based obfuscation scheme to protect design Intellectual Properties (IPs) against piracy. The novel obfuscation method embeds a secret key in the power-up state of IC, which is only known by the IP rights owner. Without the key, the IC still functions but its efficiency will be much degraded. Unlike existing IC metering techniques, the secret key in our approach is implicit thus it can also be used as a hidden watermark. Potential attacks and the countermeasures are thoroughly examined, and experimental results demonstrate the effectiveness of the method.
AB - Obfuscation is a technique that makes comprehending a design difficult and hides the secrets in the design. An obfuscation is called best-possible if the obfuscated design leaks no more information than any other design of the same function. In this paper, we prove that any best-possible obfuscation of a sequential circuit can be accomplished by a sequence of four operations: retiming, resynthesis, sweep, and conditional stuttering. Based on this fundamental result, we also develop a key-based obfuscation scheme to protect design Intellectual Properties (IPs) against piracy. The novel obfuscation method embeds a secret key in the power-up state of IC, which is only known by the IP rights owner. Without the key, the IC still functions but its efficiency will be much degraded. Unlike existing IC metering techniques, the secret key in our approach is implicit thus it can also be used as a hidden watermark. Potential attacks and the countermeasures are thoroughly examined, and experimental results demonstrate the effectiveness of the method.
UR - http://www.scopus.com/inward/record.url?scp=84883712076&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84883712076&partnerID=8YFLogxK
U2 - 10.1109/HST.2013.6581566
DO - 10.1109/HST.2013.6581566
M3 - Conference contribution
AN - SCOPUS:84883712076
SN - 9781479906000
T3 - Proceedings of the 2013 IEEE International Symposium on Hardware-Oriented Security and Trust, HOST 2013
SP - 55
EP - 60
BT - Proceedings of the 2013 IEEE International Symposium on Hardware-Oriented Security and Trust, HOST 2013
T2 - 2013 6th IEEE International Symposium on Hardware-Oriented Security and Trust, HOST 2013
Y2 - 2 June 2013 through 3 June 2013
ER -