Table of Contents
Fetching ...

Security Analysis of Universal Circuits as a Mechanism for Hardware Obfuscation

Zain Ul Abideen, Deepali Garg, Lawrence Pileggi, Samuel Pagliarini

Abstract

Universal Circuits (UCs) offer a promising approach to hardware Intellectual Property (IP) obfuscation, leveraging cryptographic principles to hide both structure and function in a programmable logic fabric. Their adaptability makes them especially suitable for the globalized Integrated Circuit (IC) supply chain, where security against threats like reverse engineering is crucial. Despite the potential, UC security remains largely unexplored. This work evaluates UC security against state-of-the-art oracle-guided (OG) and oracle-less (OL) attacks. Results show near-random success rates (approx 50%) for OG attacks whereas OL attacks display minimal structural leakage. Collectively, these findings confirm the feasibility of UCs for IP protection.

Security Analysis of Universal Circuits as a Mechanism for Hardware Obfuscation

Abstract

Universal Circuits (UCs) offer a promising approach to hardware Intellectual Property (IP) obfuscation, leveraging cryptographic principles to hide both structure and function in a programmable logic fabric. Their adaptability makes them especially suitable for the globalized Integrated Circuit (IC) supply chain, where security against threats like reverse engineering is crucial. Despite the potential, UC security remains largely unexplored. This work evaluates UC security against state-of-the-art oracle-guided (OG) and oracle-less (OL) attacks. Results show near-random success rates (approx 50%) for OG attacks whereas OL attacks display minimal structural leakage. Collectively, these findings confirm the feasibility of UCs for IP protection.

Paper Structure

This paper contains 7 sections, 4 equations, 3 figures, 2 tables, 1 algorithm.

Figures (3)

  • Figure 1: Flow for the ASIC implementation.
  • Figure 2: Attack-trace metrics CTVR, CGF, KCR, and Redundancy Ratio (RR) across ISCAS'89 benchmarks.
  • Figure 3: Execution time and COPE metric for various attacks.