论文标题
一种安全性和基于LUT的CAD流,用于易于物理综合
A Security-aware and LUT-based CAD Flow for the Physical Synthesis of eASICs
论文作者
论文摘要
许多威胁与全球化集成电路(IC)供应链有关,例如盗版,逆向工程,过度生产和恶意逻辑插入。已经提出了许多混淆方法,以防止对手完全了解IC(或部分),以减轻这些威胁。 IC内部的可重构元素的使用是一种已知的混淆技术,可以用作粗晶粒可重构块(即EFPGA)或细晶粒元素(即FPGA样查询表)。本文提出了一种安全感知的CAD流,该流量基于LUT,但仍与标准细胞的物理合成流动兼容。更确切地说,我们的CAD流探索了FPGA-ASIC设计空间,并产生了严重混淆的设计,其中逻辑的一小部分类似于ASIC。因此,我们将此专业解决方案称为“嵌入的ASIC”(EASIC)。然而,即使对于大量的LUT主导的设计,我们提出的分解和PIN交换算法也可以提高性能,从而使只有ASIC的性能水平才能实现。在安全方面,我们开发了基于新颖的模板攻击,并应用了现有的攻击,包括无甲骨文和基于甲骨文的攻击。我们的安全性分析表明,对于承受传统攻击,SHA-256研究案例的混淆率至少应为45%,而基于模板的攻击至少应为80%。当80 \%混淆的SHA-256设计被物理实施时,它在65nm的商业技术中实现了368MHz的显着频率,而其FPGA实施(在优越的技术中)仅实现了77MHz。
Numerous threats are associated with the globalized integrated circuit (IC) supply chain, such as piracy, reverse engineering, overproduction, and malicious logic insertion. Many obfuscation approaches have been proposed to mitigate these threats by preventing an adversary from fully understanding the IC (or parts of it). The use of reconfigurable elements inside an IC is a known obfuscation technique, either as a coarse grain reconfigurable block (i.e., eFPGA) or as a fine grain element (i.e., FPGA-like look-up tables). This paper presents a security-aware CAD flow that is LUT-based yet still compatible with the standard cell based physical synthesis flow. More precisely, our CAD flow explores the FPGA-ASIC design space and produces heavily obfuscated designs where only small portions of the logic resemble an ASIC. Therefore, we term this specialized solution an "embedded ASIC" (eASIC). Nevertheless, even for heavily LUT-dominated designs, our proposed decomposition and pin swapping algorithms allow for performance gains that enable performance levels that only ASICs would otherwise achieve. On the security side, we have developed novel template-based attacks and also applied existing attacks, both oracle-free and oracle-based. Our security analysis revealed that the obfuscation rate for an SHA-256 study case should be at least 45% for withstanding traditional attacks and at least 80% for withstanding template-based attacks. When the 80\% obfuscated SHA-256 design is physically implemented, it achieves a remarkable frequency of 368MHz in a 65nm commercial technology, whereas its FPGA implementation (in a superior technology) achieves only 77MHz.