phd defense methods for protecting intellectual property ... · current situation 2/51 the...

104
PhD defense Methods for protecting intellectual property of IP core designers Brice Colombier Univ Lyon, UJM-Saint-Etienne, CNRS Laboratoire Hubert Curien UMR F-, SAINT-ETIENNE, France October th ,

Upload: others

Post on 22-Aug-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and

PhD defense—

Methods for protecting intellectual propertyof IP core designers

Brice Colombier

Univ Lyon, UJM-Saint-Etienne, CNRSLaboratoire Hubert Curien UMR 5516F-42023, SAINT-ETIENNE, France

October 19th, 2017

Page 2: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and

Semiconductor industry:current situation and issues

Page 3: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and

Current situation 2/51

The semiconductor market is highly competitive, must handleincreasing design complexity andmarket pull by customers.

In last two years: sales of almost $340 billion a year [1], front-end investment for manufacturing plants reaches tens of

billion dollars [2], merger and acquisitionsmade headlines (NXP by Qualcomm,

Altera by Intel, etc) and reached almost $100 billion a year [3].

Main shift

Transition from industrial economy to knowledge economy

[1] World Semiconductor Trade Statistics “Global Semiconductor Sales Reach $339 Billion in2016”[2] EETimes “Samsung Breaks Ground on $14 Billion Fab”[3] IC Insights “2015-2016 deals dominate semiconductor M&A ranking”

Page 4: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and

Current situation 2/51

The semiconductor market is highly competitive, must handleincreasing design complexity andmarket pull by customers.

In last two years: sales of almost $340 billion a year [1], front-end investment for manufacturing plants reaches tens of

billion dollars [2], merger and acquisitionsmade headlines (NXP by Qualcomm,

Altera by Intel, etc) and reached almost $100 billion a year [3].

Main shift

Transition from industrial economy to knowledge economy

[1] World Semiconductor Trade Statistics “Global Semiconductor Sales Reach $339 Billion in2016”[2] EETimes “Samsung Breaks Ground on $14 Billion Fab”[3] IC Insights “2015-2016 deals dominate semiconductor M&A ranking”

Page 5: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and

Semiconductor industry in 1960’s: an industrial economy 3/51

Integrated devicemanufacturer(e.g. Intel)

Fabless designer(e.g. Xilinx)

Foundry(e.g. TSMC)

IP coredesigner(e.g. ARM)

Systemintegrator

Page 6: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and

Semiconductor industry in 1980’s: an economy in transition 3/51

Integrated devicemanufacturer(e.g. Intel)

Fabless designer(e.g. Xilinx)

Foundry(e.g. TSMC)

IP coredesigner(e.g. ARM)

Systemintegrator

Page 7: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and

Semiconductor industry in 2000’s: a knowledge economy 3/51

Integrated devicemanufacturer(e.g. Intel)

Fabless designer(e.g. Xilinx)

Foundry(e.g. TSMC)

IP coredesigner(e.g. ARM)

Systemintegrator

Page 8: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and

Semiconductor industry in 2000’s: a knowledge economy 3/51

Integrated devicemanufacturer(e.g. Intel)

Fabless designer(e.g. Xilinx)

Foundry(e.g. TSMC)

IP coredesigner(e.g. ARM)

Systemintegrator

Page 9: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and

Asymmetric design knowledge transfer 4/51

The IP core designermust give away all theintellectual property to the system integrator.

Main issue

The designer cannot know how manytimes the IP core has been instantiated.

This asymmetric design transfer: inhibits fine-grained licensing schemes, prevents proper billing, leads to many cases of illegal copying.

IP coredesigner(e.g. ARM)

Systemintegrator

Page 10: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and

Asymmetric design knowledge transfer 4/51

The IP core designermust give away all theintellectual property to the system integrator.

Main issue

The designer cannot know how manytimes the IP core has been instantiated.

This asymmetric design transfer: inhibits fine-grained licensing schemes, prevents proper billing, leads to many cases of illegal copying.

IP coredesigner(e.g. ARM)

Systemintegrator

Page 11: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and

Threat model and objective

Page 12: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and

Threat model 5/51

Attacker(System integrator)

Objective

Instantiate the IP corewithout the consentof the IP core designer.

Capabilities

Can obtain a legitimatecopy of the IP core,

Has all the technicalresources to instantiatethe IP core correctly.

Defender(IP core designer)

Objectives

Prevent under-reportingof IP core instances,

Make illegal copiesunusable.

Constraint Keep the overall cost

inferior to the financiallosses on illegal copying.

Page 13: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and

Threat model 5/51

Attacker(System integrator)

Objective

Instantiate the IP corewithout the consentof the IP core designer.

Capabilities

Can obtain a legitimatecopy of the IP core,

Has all the technicalresources to instantiatethe IP core correctly.

Defender(IP core designer)

Objectives

Prevent under-reportingof IP core instances,

Make illegal copiesunusable.

Constraint Keep the overall cost

inferior to the financiallosses on illegal copying.

Page 14: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and

Threat model 5/51

Attacker(System integrator)

Objective

Instantiate the IP corewithout the consentof the IP core designer.

Capabilities

Can obtain a legitimatecopy of the IP core,

Has all the technicalresources to instantiatethe IP core correctly.

Defender(IP core designer)

Objectives

Prevent under-reportingof IP core instances,

Make illegal copiesunusable.

Constraint Keep the overall cost

inferior to the financiallosses on illegal copying.

Page 15: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and

Threat model 5/51

Attacker(System integrator)

Objective

Instantiate the IP corewithout the consentof the IP core designer.

Capabilities

Can obtain a legitimatecopy of the IP core,

Has all the technicalresources to instantiatethe IP core correctly.

Defender(IP core designer)

Objectives

Prevent under-reportingof IP core instances,

Make illegal copiesunusable.

Constraint Keep the overall cost

inferior to the financiallosses on illegal copying.

Page 16: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and

Objective 6/51

Objective: a licensing scheme for IP cores

Ï Before activation: The IP core does not operate correctly/at all. During activation: The IP core must be provided with the

correct, instance-specific activation word± After activation: The IP core operates normally.

Business Monetization, Pay-per-use, Royalties.

Software Modified design flow, Database, Key management.

Hardware Activation, ID, Security.

Page 17: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and

Objective 6/51

Objective: a licensing scheme for IP cores

Ï Before activation: The IP core does not operate correctly/at all. During activation: The IP core must be provided with the

correct, instance-specific activation word± After activation: The IP core operates normally.

Business Monetization, Pay-per-use, Royalties.

Software Modified design flow, Database, Key management.

Hardware Activation, ID, Security.

Page 18: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and

Objective 7/51

A secure remote activation scheme that is:

Easy to use by legitimate parties, seamless integration into the standard design flow,

low impact on the performances of the IP core,

usable for any IP core (universal),

Hard to circumvent for an adversary, impossibility to use illegal copies,

security guaranteed by a cipher,

instance-specific identifier.

Page 19: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and

Contributions and outline

Page 20: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and

Standard (and heavily simplified) design flow 8/51

Page 21: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and

Augmented design flow 9/51

Logic modifications

Modify the combinational logic toallow to controllably: Lock the outputs (logic locking), Alter the outputs (logic masking).

Activation

Intrinsic identification of theinstances of the IP core.

Secure transfer of theinstance-specific activation word.

Page 22: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and

Augmented design flow 9/51

Logic modifications

Modify the combinational logic toallow to controllably: Lock the outputs (logic locking), Alter the outputs (logic masking).

Activation

Intrinsic identification of theinstances of the IP core.

Secure transfer of theinstance-specific activation word.

Page 23: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and

Outline 10/51

Outline:

1. Computationally-efficient selection heuristics for logic masking

2. Combinational logic locking for very large netlists

3. Lightweight error-correction module for PUF responses

4. Overall integration and demonstrator

Page 24: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and

Scalable logic maskingwith centrality indicators

Page 25: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and

Logic masking: definition 11/51

The netlist is modified and an associated AW is obtained [4].

[4] J. A. Roy, F. Koushanfar, and I. Markov. “EPIC: Ending Piracy of Integrated Circuits”. DATE.2008, pp. 1069–1074

Page 26: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and

Logic masking: definition 12/51

Principle

Insert XOR and XNOR gates at specific locations in the netlist

Original netlist Masked netlist

Objective: masking efficiency

The outputs should be as different as possible if AW is wrong

Page 27: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and

Logic masking: definition 12/51

Principle

Insert XOR and XNOR gates at specific locations in the netlist

Original netlist Masked netlist

Objective: masking efficiency

The outputs should be as different as possible if AW is wrong

Page 28: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and

Nodes selection heuristics 13/51

Several heuristics exist to select the place of insertion:

Selection Year Masking Computationalheuristic efficiency complexity

Random [4] 2008 Ï ±Fan-in/fan-out cones [5] 2009 Ï ±Fault analysis [6] 2015 ± Ï

[4] J. A. Roy, F. Koushanfar, and I. Markov. “EPIC: Ending Piracy of Integrated Circuits”. DATE.2008, pp. 1069–1074[5] R. S. Chakraborty and S. Bhunia. “HARPOON: An Obfuscation-Based SoC Design

Methodology for Hardware Protection”. IEEE Trans. on CAD of IC and Systems 28.10 (2009),pp. 1493–1502[6] J. Rajendran et al. “Fault Analysis-Based Logic Encryption”. IEEE Transactions on

Computers 64.2 (2015), pp. 410–424

Page 29: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and

Graph representation of a gate-level netlist 14/51

Conversion rules

Wires VerticesLogic gates Edges

Logic masking heuristic

Insert XOR/XNOR gates on verticesthat have the highest centrality.

Page 30: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and

Graph representation of a gate-level netlist 14/51

Conversion rules

Wires VerticesLogic gates Edges

Logic masking heuristic

Insert XOR/XNOR gates on verticesthat have the highest centrality.

Page 31: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and

Centrality indicators 15/51

Centrality: Importance of a given vertex inside a graph

Twitter network graph, Copyright Marc Smith on Flickr under license CC BY 2.0

Page 32: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and

Centrality indicators 15/51

Centrality: Importance of a given vertex inside a graph

Twitter network graph, Copyright Marc Smith on Flickr under license CC BY 2.0

Page 33: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and

Comparison of centrality indicators 16/51

Degree Betwenness Current-flowbetweenness

0.04 0.02 0.00 0.02 0.040.050

0.025

0.000

0.025

0.050

0

0.5

1

Cent

ralit

y

Closeness Current-flow closeness

Page 34: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and

Masking efficiency VS computational complexity 17/51

0.0 0.2 0.4 0.6 0.8 1.0Bitwise output correlation

1

10

100

1k

10k

100k

Com

puta

tion

time

ratio

VS ra

ndom

sele

ctio

nCentrality indicator

ClosenessBetweenness

Current-flow betweennessCurrent-flow closeness

Other heuristicsRandomFan-in/Fan-out conesFault-analysis

Current-flow closeness

Bitwise correlation is almost as low as for the faultanalysis-based heuristic, for a 1000x shorter run-time.

Page 35: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and

Current-flow closeness centrality 18/51

0.04 0.02 0.00 0.02 0.040.050

0.025

0.000

0.025

0.050

0

0.5

1

Cent

ralit

y

Definition:Inverse of the sum of effective resistancebetween the vertex of interest and all theother vertices of the graph.

C(v) = 1∑y∈V

Reff(v,y)

Page 36: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and

Current-flow closeness centrality 18/51

0.04 0.02 0.00 0.02 0.040.050

0.025

0.000

0.025

0.050

0

0.5

1

Cent

ralit

y

Definition:Inverse of the sum of effective resistancebetween the vertex of interest and all theother vertices of the graph.

C(v) = 1∑y∈V

Reff(v,y)

Page 37: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and

Current-flow closeness centrality 18/51

0.04 0.02 0.00 0.02 0.040.050

0.025

0.000

0.025

0.050

0

0.5

1

Cent

ralit

y

Definition:Inverse of the sum of effective resistancebetween the vertex of interest and all theother vertices of the graph.

C(v) = 1∑y∈V

Reff(v,y)

Page 38: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and

Logic masking using centrality indicators: conclusion 19/51

Logic masking using centrality indicators:± better trade-off than existing heuristics between masking

efficiency and computational complexity,± only efficientmasking selection heuristic for real-life netlists.

5 could be parallelized.

Associated publication:

W B. Colombier, L. Bossuet, and D. Hély. “Centrality Indicators for Efficient and Scalable LogicMasking”. ISVLSI. 2017, pp. 98–103

Page 39: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and

Combinational logic locking

Page 40: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and

Logic locking: definition 20/51

The netlist is modified and an AW (activation word) is obtained.

Page 41: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and

Logic locking: definition 21/51

Principle

Insert AND and OR gates at specific locations in the netlist

Original netlist Locked netlist

Objective

The outputs should be forced to a fixed logic value.

Page 42: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and

Logic locking: definition 21/51

Principle

Insert AND and OR gates at specific locations in the netlist

Original netlist Locked netlist

Objective

The outputs should be forced to a fixed logic value.

Page 43: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and

Principle of combinational logic locking 22/51

Identify nodes inside the netlist that propagate a locking value.

Condition for propagating a locking value

The node is forced to the controlling value of the next gate.

Page 44: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and

Principle of combinational logic locking 22/51

Identify nodes inside the netlist that propagate a locking value.

Condition for propagating a locking value

The node is forced to the controlling value of the next gate.

Page 45: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and

Principle of combinational logic locking 22/51

Identify nodes inside the netlist that propagate a locking value.

Condition for propagating a locking value

The node is forced to the controlling value of the next gate.

Page 46: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and

Principle of combinational logic locking 22/51

Identify nodes inside the netlist that propagate a locking value.

Condition for propagating a locking value

The node is forced to the controlling value of the next gate.

Page 47: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and

Graph processing 23/51

Processing

Remove the incoming edges of vertices that are associatedwith nodes that cannot propagate a locking value.

Page 48: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and

Selection of the nodes to lock 24/51

SelectionSelect the nodes that are as far as possible fromthe outputs and lock as many outputs as possible.

Page 49: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and

Locking gates insertion 25/51

Choice of the type of locking gate

Force to 0: insert an AND gate, Force to 1: insert an OR gate.

Page 50: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and

Experimental results: processing time 26/51

ITC’99 benchmarks: 1k to 200k gates.

1k 10k 100k#logic gates

1

10

100

1000

Anal

ysis

time

(s)

1 s

1 min

1 h

Netlists of up to 20k gates are processed in less than aminute.

Netlists of up to 200k gates are processed in less than an hour.

Page 51: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and

Experimental results: area overhead 27/51

1k 10k 100k#logic gates

1

2

3

4

5

Area

ove

rhea

d (%

)

2.89

Average overhead

Locking all the outputs requires an area overhead below 3%.

Page 52: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and

Combinational logic locking: conclusion 28/51

Combinational logic locking:± is the onlymethod for logic modifications that can handle

very large netlists (200k logic gates in less than one hour),± has a low area overhead below 3%.± offers obfuscation possibilities: interleaving, NAND/NOR gates.

Associated publications:

W B. Colombier, L. Bossuet, and D. Hély. “From Secured Logic to IP Protection”. ElsevierMicroprocessors and Microsystems 47 (2016), pp. 44–54

W B. Colombier, L. Bossuet, and D. Hély. “Reversible Denial-of-Service by Locking GatesInsertion for IP Cores Design Protection”. ISVLSI. 2015, pp. 210–215

Page 53: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and

Attacks on combinational logic modifications 29/51

Efficientmasking methods are vulnerable to attacks targetting AW: Hill-climbing [7] SAT [8]

Solution

Not expose AW input, drive it with the output of a cipher.

[7] S. M. Plaza and I. L. Markov. “Solving the Third-Shift Problem in IC Piracy With Test-AwareLogic Locking”. IEEE Trans. on CAD of Integrated Circuits and Systems 34.6 (2015), pp. 961–971[8] P. Subramanyan, S. Ray, and S. Malik. “Evaluating the security of logic encryption

algorithms”. HOST. 2015, pp. 137–143

Page 54: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and

Key reconciliation protocol forerror correction in PUF responses

Page 55: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and

Physical Unclonable Functions (PUFs) 30/51

PUFs are the fingerprints of integrated circuits.

Uniqueness property

Because of random manufacturing process variations,r is different from one PUF instance to the other.

Page 56: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and

Physical Unclonable Functions (PUFs) 30/51

PUFs are the fingerprints of integrated circuits.

Uniqueness property

Because of random manufacturing process variations,r is different from one PUF instance to the other.

Page 57: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and

Physical Unclonable Functions (PUFs) 30/51

PUFs are the fingerprints of integrated circuits.

Uniqueness property

Because of random manufacturing process variations,r is different from one PUF instance to the other.

Page 58: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and

Physical Unclonable Functions (PUFs) 30/51

PUFs are the fingerprints of integrated circuits.

Uniqueness property

Because of random manufacturing process variations,r is different from one PUF instance to the other.

Page 59: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and

The instability issue 31/51

Problem

PUF responses to the same challenge change over time.

This variation depends on multiple parameters: PUF architecture, Process node, Aging, Temperature, Environment, etc.

Page 60: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and

Error correction for PUF responses 32/51

Solution

Apply a technique of error correction to the PUF response

Page 61: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and

Error correction for PUF responses 32/51

Solution

Apply a technique of error correction to the PUF response

Page 62: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and

Error correction for PUF responses 32/51

Solution

Apply a technique of error correction to the PUF response

Page 63: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and

Similarities between two scenarios 33/51

Quantum key exchange

|key| < |m|

PUF-based ID generation

|ID| < |rt|

Page 64: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and

CASCADE protocol 34/51

One pass

Perform parity checks on blocks of the PUF response, Isolate the errors using binary search and correct them, Check current parity of blocks and backtrack, Increase the block size and shuffle the response randomly.

Parameters

Initial block size, Number of passes,

Block size multiplier.

Information leakage associated with the public discussion

For an n-bit response split into k-bit blocks: Parity checks: n/k-bit leakage. Binary search: log2(k)-bit leakage.

Page 65: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and

CASCADE protocol 34/51

One pass

Perform parity checks on blocks of the PUF response, Isolate the errors using binary search and correct them, Check current parity of blocks and backtrack, Increase the block size and shuffle the response randomly.

Parameters

Initial block size, Number of passes,

Block size multiplier.

Information leakage associated with the public discussion

For an n-bit response split into k-bit blocks: Parity checks: n/k-bit leakage. Binary search: log2(k)-bit leakage.

Page 66: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and

CASCADE protocol 34/51

One pass

Perform parity checks on blocks of the PUF response, Isolate the errors using binary search and correct them, Check current parity of blocks and backtrack, Increase the block size and shuffle the response randomly.

Parameters

Initial block size, Number of passes,

Block size multiplier.

Information leakage associated with the public discussion

For an n-bit response split into k-bit blocks: Parity checks: n/k-bit leakage. Binary search: log2(k)-bit leakage.

Page 67: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and

CASCADE execution 34/51

0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15

Blocks of evenrelative parity:

∅Blocks of oddrelative parity:

Relative parity: Pr(B0, Bt) =( m−1⊕

i=0

r0[B0[i]])

︸ ︷︷ ︸Parity of B0

⊕( m−1⊕

i=0

rt[Bt[i]])

︸ ︷︷ ︸Parity of Bt

Page 68: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and

CASCADE execution 34/51

0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15

0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15

Correction

Blocks of evenrelative parity:

∅Blocks of oddrelative parity:

Relative parity: Pr(B0, Bt) =( m−1⊕

i=0

r0[B0[i]])

︸ ︷︷ ︸Parity of B0

⊕( m−1⊕

i=0

rt[Bt[i]])

︸ ︷︷ ︸Parity of Bt

Page 69: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and

CASCADE execution 34/51

0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15

0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15

Correction

Blocks of evenrelative parity:

3210 7654

111098 15141312

Blocks of oddrelative parity:

Relative parity: Pr(B0, Bt) =( m−1⊕

i=0

r0[B0[i]])

︸ ︷︷ ︸Parity of B0

⊕( m−1⊕

i=0

rt[Bt[i]])

︸ ︷︷ ︸Parity of Bt

Page 70: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and

CASCADE execution 34/51

0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15

0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15

0 12 34 5 67 89 10 1112 1314 15

Correction

Shuffling

Blocks of evenrelative parity:

3210 7654

111098 15141312

Blocks of oddrelative parity:

Relative parity: Pr(B0, Bt) =( m−1⊕

i=0

r0[B0[i]])

︸ ︷︷ ︸Parity of B0

⊕( m−1⊕

i=0

rt[Bt[i]])

︸ ︷︷ ︸Parity of Bt

Page 71: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and

CASCADE execution 34/51

0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15

0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15

0 12 34 5 67 89 10 1112 1314 15

0 12 34 5 67 89 10 1112 1314 15

Correction

Shuffling

Correction

Blocks of evenrelative parity:

3210 7654

111098 15141312

Blocks of oddrelative parity:

Relative parity: Pr(B0, Bt) =( m−1⊕

i=0

r0[B0[i]])

︸ ︷︷ ︸Parity of B0

⊕( m−1⊕

i=0

rt[Bt[i]])

︸ ︷︷ ︸Parity of Bt

Page 72: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and

CASCADE execution 34/51

0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15

0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15

0 12 34 5 67 89 10 1112 1314 15

0 12 34 5 67 89 10 1112 1314 15

Correction

Shuffling

Correction

Blocks of evenrelative parity:

3210 7654

111098 15141312

118102 16153

741412 51309

Blocks of oddrelative parity:

Relative parity: Pr(B0, Bt) =( m−1⊕

i=0

r0[B0[i]])

︸ ︷︷ ︸Parity of B0

⊕( m−1⊕

i=0

rt[Bt[i]])

︸ ︷︷ ︸Parity of Bt

Page 73: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and

CASCADE execution 34/51

0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15

0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15

0 12 34 5 67 89 10 1112 1314 15

0 12 34 5 67 89 10 1112 1314 15

Correction

Shuffling

Correction

Blocks of evenrelative parity:

3210 7654

111098 15141312

118102 16153

741412 51309

Blocks of oddrelative parity:

Relative parity: Pr(B0, Bt) =( m−1⊕

i=0

r0[B0[i]])

︸ ︷︷ ︸Parity of B0

⊕( m−1⊕

i=0

rt[Bt[i]])

︸ ︷︷ ︸Parity of Bt

Page 74: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and

CASCADE execution 34/51

0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15

0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15

0 12 34 5 67 89 10 1112 1314 15

0 12 34 5 67 89 10 1112 1314 15

Correction

Shuffling

Correction

Blocks of evenrelative parity:

3210 7654

118102 16153

741412 51309

Blocks of oddrelative parity:

111098 15141312

Relative parity: Pr(B0, Bt) =( m−1⊕

i=0

r0[B0[i]])

︸ ︷︷ ︸Parity of B0

⊕( m−1⊕

i=0

rt[Bt[i]])

︸ ︷︷ ︸Parity of Bt

Page 75: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and

CASCADE execution 34/51

0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15

0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15

0 12 34 5 67 89 10 1112 1314 15

0 12 34 5 67 89 10 1112 1314 15

0 12 34 5 67 89 10 1112 1314 15

Correction

Shuffling

Correction

Extra correction

Blocks of evenrelative parity:

3210 7654

118102 16153

741412 51309

Blocks of oddrelative parity:

111098 15141312

Relative parity: Pr(B0, Bt) =( m−1⊕

i=0

r0[B0[i]])

︸ ︷︷ ︸Parity of B0

⊕( m−1⊕

i=0

rt[Bt[i]])

︸ ︷︷ ︸Parity of Bt

Page 76: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and

CASCADE execution 34/51

0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15

0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15

0 12 34 5 67 89 10 1112 1314 15

0 12 34 5 67 89 10 1112 1314 15

0 12 34 5 67 89 10 1112 1314 15

Correction

Shuffling

Correction

Extra correction

Blocks of evenrelative parity:

3210 7654

118102 16153

741412 51309

Blocks of oddrelative parity:

111098 15141312

Relative parity: Pr(B0, Bt) =( m−1⊕

i=0

r0[B0[i]])

︸ ︷︷ ︸Parity of B0

⊕( m−1⊕

i=0

rt[Bt[i]])

︸ ︷︷ ︸Parity of Bt

Page 77: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and

CASCADE execution 34/51

0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15

0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15

0 12 34 5 67 89 10 1112 1314 15

0 12 34 5 67 89 10 1112 1314 15

0 12 34 5 67 89 10 1112 1314 15

Correction

Shuffling

Correction

Extra correction

Blocks of evenrelative parity:

3210 7654

111098

118102 16153

Blocks of oddrelative parity:

15141312

741412 51309

Relative parity: Pr(B0, Bt) =( m−1⊕

i=0

r0[B0[i]])

︸ ︷︷ ︸Parity of B0

⊕( m−1⊕

i=0

rt[Bt[i]])

︸ ︷︷ ︸Parity of Bt

Page 78: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and

CASCADE execution 34/51

0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15

0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15

0 12 34 5 67 89 10 1112 1314 15

0 12 34 5 67 89 10 1112 1314 15

0 12 34 5 67 89 10 1112 1314 15

0 12 34 5 67 89 10 1112 1314 15

Correction

Shuffling

Correction

Extra correction

Extra correction

Blocks of evenrelative parity:

3210 7654

111098

118102 16153

Blocks of oddrelative parity:

15141312

741412 51309

Relative parity: Pr(B0, Bt) =( m−1⊕

i=0

r0[B0[i]])

︸ ︷︷ ︸Parity of B0

⊕( m−1⊕

i=0

rt[Bt[i]])

︸ ︷︷ ︸Parity of Bt

Page 79: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and

CASCADE execution 34/51

0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15

0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15

0 12 34 5 67 89 10 1112 1314 15

0 12 34 5 67 89 10 1112 1314 15

0 12 34 5 67 89 10 1112 1314 15

0 12 34 5 67 89 10 1112 1314 15

Correction

Shuffling

Correction

Extra correction

Extra correction

Blocks of evenrelative parity:

3210 7654

111098

118102 16153

Blocks of oddrelative parity:

15141312

741412 51309

Relative parity: Pr(B0, Bt) =( m−1⊕

i=0

r0[B0[i]])

︸ ︷︷ ︸Parity of B0

⊕( m−1⊕

i=0

rt[Bt[i]])

︸ ︷︷ ︸Parity of Bt

Page 80: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and

CASCADE execution 34/51

0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15

0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15

0 12 34 5 67 89 10 1112 1314 15

0 12 34 5 67 89 10 1112 1314 15

0 12 34 5 67 89 10 1112 1314 15

0 12 34 5 67 89 10 1112 1314 15

Correction

Shuffling

Correction

Extra correction

Extra correction

Blocks of evenrelative parity:

3210 7654

111098 15141312

118102 16153

741412 51309

Blocks of oddrelative parity:

Relative parity: Pr(B0, Bt) =( m−1⊕

i=0

r0[B0[i]])

︸ ︷︷ ︸Parity of B0

⊕( m−1⊕

i=0

rt[Bt[i]])

︸ ︷︷ ︸Parity of Bt

Page 81: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and

Real-life example 35/51

PUFs based on oscillators have a typical error-rate of 2-3% [9] [10].Keep 128 bits secret from a 256-bit response with failure rate < 10-6.

0 1 3 5 10 15 20Passes

0163264

128

206

256

Fina

l res

pons

e le

ngth

(bits

)

4-bit initial blocks8-bit initial blocks

16-bit initial blocks32-bit initial blocks

Security thresholdShannon bound

0 5 10 15 20Passes

1

10 1

10 2

10 3

10 4

10 5

< 10 6

Failu

re ra

te

0 1 3 5 10 15 20Passes

03264

128

206

256

Fina

l res

pons

e le

ngth

(bits

)

[9] A. Maiti, J. Casarona, L. McHale, and P. Schaumont. “A large scale characterization ofRO-PUF”. . HOST. 2010, pp. 94–99[10] A. Cherkaoui, L. Bossuet, and C. Marchand. “Design, Evaluation and Optimization ofPhysical Unclonable Functions based on Transient Effect Ring Oscillators”. IEEE Transactions onInformation Forensics and Security 11.6 (2016), pp. 1291–1305

Page 82: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and

Real-life example 35/51

PUFs based on oscillators have a typical error-rate of 2-3% [9] [10].Keep 128 bits secret from a 256-bit response with failure rate < 10-6.

0 1 3 5 10 15 20Passes

0163264

128

206

256

Fina

l res

pons

e le

ngth

(bits

)

4-bit initial blocks8-bit initial blocks

16-bit initial blocks32-bit initial blocks

Security thresholdShannon bound

0 5 10 15 20Passes

1

10 1

10 2

10 3

10 4

10 5

< 10 6

Failu

re ra

te

0 1 3 5 10 15 20Passes

03264

128

206

256

Fina

l res

pons

e le

ngth

(bits

)

[9] A. Maiti, J. Casarona, L. McHale, and P. Schaumont. “A large scale characterization ofRO-PUF”. . HOST. 2010, pp. 94–99[10] A. Cherkaoui, L. Bossuet, and C. Marchand. “Design, Evaluation and Optimization ofPhysical Unclonable Functions based on Transient Effect Ring Oscillators”. IEEE Transactions onInformation Forensics and Security 11.6 (2016), pp. 1291–1305

Page 83: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and

Real-life example 35/51

PUFs based on oscillators have a typical error-rate of 2-3% [9] [10].Keep 128 bits secret from a 256-bit response with failure rate < 10-6.

0 1 3 5 10 15 20Passes

0163264

128

206

256

Fina

l res

pons

e le

ngth

(bits

)

4-bit initial blocks8-bit initial blocks

16-bit initial blocks32-bit initial blocks

Security thresholdShannon bound

0 5 10 15 20Passes

1

10 1

10 2

10 3

10 4

10 5

< 10 6

Failu

re ra

te

0 1 3 5 10 15 20Passes

03264

128

206

256

Fina

l res

pons

e le

ngth

(bits

)

[9] A. Maiti, J. Casarona, L. McHale, and P. Schaumont. “A large scale characterization ofRO-PUF”. . HOST. 2010, pp. 94–99[10] A. Cherkaoui, L. Bossuet, and C. Marchand. “Design, Evaluation and Optimization ofPhysical Unclonable Functions based on Transient Effect Ring Oscillators”. IEEE Transactions onInformation Forensics and Security 11.6 (2016), pp. 1291–1305

Page 84: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and

Hardware architectures for the parity computation module 36/51

Logic resources: Spartan 3: 67 Slices Spartan 6: 19 Slices 0 RAM bits

Logic resources: Spartan 3: 3 Slices Spartan 6: 1 Slice 256 RAM bits

Page 85: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and

Classical error-correcting codes for PUFs 37/51

Article Construction and code(s) Logic resources (Slices) BlockSpartan 3 Spartan 6 RAM bits

[11] Reed-Muller (4, 7) 179 0

[12] Reed-Muller (2, 6) 164 192

[13] Concatenated: Repetition and Reed Muller 168 0

[14] Differential Sequence Coding and Viterbi 75 27 10752

This work: CASCADE protocol logic only 67 19 0

with RAM 3 1 256

[11] M. Hiller et al. “Low-Area Reed Decoding in a Generalized Concatenated CodeConstruction for PUFs”. ISVLSI. 2015, pp. 143–148[12] R. Maes, P. Tuyls, and I. Verbauwhede. “Low-Overhead Implementation of a Soft DecisionHelper Data Algorithm for SRAM PUFs”. CHES. 2009, pp. 332–347[13] C. Bösch et al. “Efficient Helper Data Key Extractor on FPGAs”. CHES. 2008, pp. 181–197[14] M. Hiller, M. Yu, and G. Sigl. “Cherry-Picking Reliable PUF Bits With Differential SequenceCoding”. IEEE Trans. Information Forensics and Security 11.9 (2016), pp. 2065–2076

Page 86: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and

Key reconciliation protocol for PUF responses: conclusion 38/51

First usage of a key reconciliation protocol for PUF responses:± most lightweight error-correction solution of state-of-the-art,± can reach very low failure rates (down to 10−8),± leakage is limited and easy to estimate,± parameterizable and can be changed on the fly.

Associated publication:

W B. Colombier, L. Bossuet, D. Hély, and V. Fischer. “Key Reconciliation Protocols for ErrorCorrection of Silicon PUF Responses”. IEEE Transactions on Information Forensics and Security12.8 (2017), pp. 1988–2002

Page 87: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and

Integration and demonstrator

Page 88: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and

Objective 39/51

A secure remote activation scheme that is:

Easy to use by legitimate parties,± seamless integration into the standard design flow,

± low impact on the performances of the IP core,

± usable for any IP core (universal),

Hard to circumvent for an adversary,± impossibility to use illegal copies,

± instance-specific identifier,

± security guaranteed by a cipher [15].

[15] C. Marchand, L. Bossuet, and K. Gaj. “Area-oriented comparison of lightweight blockciphers implemented in hardware for the activation mechanism in the anti-counterfeitingschemes”. International Journal of Circuit Theory and Applications 45.2 (2017), pp. 274–291

Page 89: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and

Hardware/software infrastructure 40/51

Page 90: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and

Hardware/software infrastructure 40/51

Page 91: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and

IP protection module overview 41/51

Intel Cyclone V Microsemi SF2

6-LUTs DFFs 4-LUTs DFFs

TERO-PUF 4841 160 2258 158Response shift register 0 128 0 128

Communication 321 2560 2664 2478MUX indexes 128x7:7 301 0 595 0

IP protection module ∼500 ∼350 ∼700 ∼350MUX response bits 128:1 67 0 85 0AW storage 0 128 0 128CASCADEmodule 1 1 1 1Controller 104 90 101 69Cipher [15] ∼300 ∼200 ∼500 ∼200

Page 92: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and

Typical use-case at design time 42/51

Typical use-case at design time

Modify the combinational design to make it activable, Wrap the design with the additional components:

block cipher , PUF , CASCADE module , etc. Store the associated activation word.

Page 93: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and

Typical use-case at enrollment time 43/51

Typical use-case at enrollment time

Get the PUF reference response, Optional: Characterize the PUF in operational conditions

to estimate the expected error-rate, Store the reference response on the server.

Page 94: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and

Typical use-case at activation time 44/51

Typical use-case at activation time

Re-generate a PUF response on the device, Perform reconciliation to correct the PUF response on the

server side, Encrypt the activation word with the response and send it.

Page 95: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and

IP protection module overview 45/51

https://gitlab.com/SALWARE/salware_hector_mbhttps://gitlab.com/SALWARE/salware_db_sf2

Page 96: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and

Hardware/software infrastructure 46/51

Page 97: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and

Software at design time 47/51

Parse the netlist (multiple formats) into a graph

Modify the graph for logic locking/masking

Convert back into a netlist

Add the AW decoder

Wrap with the extra components

Page 98: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and

Software at enrolment/activation time 48/51

Get the PUF reference response and store it

Perform the reconciliation

Encrypt the AW and send it

https://gitlab.com/SALWARE/salware_appAssociated publications:

W B. Colombier et al. “Hardware Demo: Complete Activation Scheme for IP DesignProtection”. HOST. 2017W B. Colombier et al. “Hardware Demo: Complete Activation Scheme for IP DesignProtection”. FPL. 2017W B. Colombier, L. Bossuet, and D. Hély. “A comprehensive hardware/software infrastructurefor IP cores design protection”. FPT. 2017

Page 99: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and

Software at enrolment/activation time 48/51

Get the PUF reference response and store it

Perform the reconciliation

Encrypt the AW and send it

https://gitlab.com/SALWARE/salware_appAssociated publications:

W B. Colombier et al. “Hardware Demo: Complete Activation Scheme for IP DesignProtection”. HOST. 2017W B. Colombier et al. “Hardware Demo: Complete Activation Scheme for IP DesignProtection”. FPL. 2017W B. Colombier, L. Bossuet, and D. Hély. “A comprehensive hardware/software infrastructurefor IP cores design protection”. FPT. 2017

Page 100: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and

Conclusion and perspectives

Page 101: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and

Conclusion 49/51

³Summary of contributions: Two methods of logic modifications for IP protection:

Logic locking: lightweight and scalable to very large netlists, Centrality-based logic masking: better trade-off between

computational complexity and masking efficiency,

First use of the CASCADE key reconciliation protocol with PUFs,10x more lightweight than existing ECCs,

Full integration and demonstrator.

Publications: 4 journals (2x IEEE TIFS, MICPRO, IET-CDT), 4 international conferences (2x ISVLSI, FCCM, FPT).

Page 102: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and

Research perspectives 50/51

fPossible research perspectives: Fine-grained licensing approaches (evaluation, premium, etc), Security evaluation of hardware IP protections, Trusted computing: (un)trusted mode (un)locked IP core, Solutions for analog IP cores (25% of counterfeited ICs).

Page 103: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and

Industrial perspectives 51/51

Possible industrial perspectives:

︷ ︸︸ ︷Business Monetization, Pay-per-use, Royalties.

Software Modified design flow, Database, Key management.

Hardware Activation, ID, Security.︸ ︷︷ ︸

—Questions ? —

Page 104: PhD defense Methods for protecting intellectual property ... · Current situation 2/51 The semiconductor market is highly competitive, must handle increasing design complexity and

Industrial perspectives 51/51

Possible industrial perspectives:

︷ ︸︸ ︷Business Monetization, Pay-per-use, Royalties.

Software Modified design flow, Database, Key management.

Hardware Activation, ID, Security.︸ ︷︷ ︸

—Questions ? —