A Module-Level Configuration Methodology for Programmable Camouflaged Logic

Jianfeng Wang,Zhonghao Chen,Jiahao Zhang,Yixin Xu,Tongguang Yu,Ziheng Zheng,Enze Ye,Sumitha George,Huazhong Yang,Yongpan Liu,Kai Ni,Vijaykrishnan Narayanan,Xueqing Li
DOI: https://doi.org/10.1145/3640462
IF: 1.447
2024-02-14
ACM Transactions on Design Automation of Electronic Systems
Abstract:Logic camouflage is a widely adopted technique that mitigates the threat of intellectual property (IP) piracy and overproduction in the integrated circuit (IC) supply chain. Camouflaged logic achieves functional obfuscation through physical-level ambiguity and post-manufacturing programmability. However, discussions on programmability are confined to the level of logic cells/gates, limiting the broader-scale application of logic camouflage. In this work, we propose a novel module-level configuration methodology for programmable camouflaged logic that can be implemented without additional hardware ports and with negligible resources. We prove theoretically that the configuration of the programmable camouflaged logic cells can be achieved through the inputs and netlist of the original module. Further, we propose a novel lightweight ferroelectric FET (FeFET)-based reconfigurable logic gate (rGate) family and apply it to the proposed methodology. With the flexible replacement and the proposed configuration-aware conversion algorithm, this work is characterized by the input-only programming scheme as well as the combination of high output error rate and point-function-like defense. Evaluations show an average of >95% of the alternative rGate location for camouflage, which is sufficient for the security-aware design. We illustrate the exponential complexity in function state traversal and the enhanced defense capability of locked blackbox against Boolean Satisfiability (SAT) attacks compared with key-based methods. We also preserve an evident output Hamming distance and introduce negligible hardware overheads in both gate-level and module-level evaluations under typical benchmarks.
computer science, software engineering, hardware & architecture
What problem does this paper attempt to address?
The problem that this paper attempts to solve is to protect intellectual property (IP) from the threats of piracy and over - production in the integrated circuit (IC) supply chain. Specifically, the author proposes a module - level configuration method for programmable camouflaged logic to improve the security and flexibility of IP protection. Traditional logic camouflage techniques are usually configured at the time of manufacturing and lack post - manufacturing programmability, which limits their application scope. Although logic locking techniques provide post - manufacturing programmability, they require additional hardware ports, increasing hardware overhead and being vulnerable to SAT - based attacks. The main contributions of this paper are as follows: 1. **Module - level programming method**: A comprehensive methodology is proposed to support IP owners in achieving module - level programmable camouflaged logic configuration without using additional key ports. 2. **rGate (reconfigurable Gate) family**: A set of low - cost, reconfigurable logic gates based on ferroelectric field - effect transistors (FeFET) are introduced. These gates can accept logical inputs to configure logical functions. 3. **Configuration - aware rGate conversion algorithm**: An algorithm is proposed for selecting and converting potential rGate positions from the original IP module, ensuring that the camouflaged module can be correctly programmed only through input ports and internal nets. 4. **Security and overhead analysis**: The security and defense capabilities of this method in various attack scenarios, especially against attacks on locked devices, are analyzed. It shows an exponentially increasing number of functional configuration attempts and point - like function defense characteristics while maintaining output destruction capabilities. In addition, the hardware overhead is also compared and analyzed. Through these contributions, the paper provides a new method to enhance the security and flexibility of logic camouflage while reducing hardware overhead and improving module - level programmability.