55
1 Hardware Metering Mark Tehranipoor Introduction to Hardware Security & Trust University of Florida

Introduction to Hardware Security & Trust University of Floridatehranipoor.ece.ufl.edu/05 Hardware Metering.pdf · 2018-03-10 · ID (ECID) 10 Hardware Metering n Hardware metering

  • Upload
    others

  • View
    4

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Introduction to Hardware Security & Trust University of Floridatehranipoor.ece.ufl.edu/05 Hardware Metering.pdf · 2018-03-10 · ID (ECID) 10 Hardware Metering n Hardware metering

1

Hardware Metering

Mark Tehranipoor

Introduction to Hardware Security & TrustUniversity of Florida

Page 2: Introduction to Hardware Security & Trust University of Floridatehranipoor.ece.ufl.edu/05 Hardware Metering.pdf · 2018-03-10 · ID (ECID) 10 Hardware Metering n Hardware metering

Background: Test and Yield

n Errors in fabrication process cause defects on chip which causes chip to malfunction.

n Chips are tested in order to detect defectsn Failing chips are discardedn Fraction(percentage) of remaining good chips is called the

yield.Yield = total chips – discarded chips

total chips

n Foundry decides/predictsyield

8 February 2018 2

Page 3: Introduction to Hardware Security & Trust University of Floridatehranipoor.ece.ufl.edu/05 Hardware Metering.pdf · 2018-03-10 · ID (ECID) 10 Hardware Metering n Hardware metering

3

HW Threats

IP Vendor

System Integrator

Manufacture

Any of these steps can be untrusted

Page 4: Introduction to Hardware Security & Trust University of Floridatehranipoor.ece.ufl.edu/05 Hardware Metering.pdf · 2018-03-10 · ID (ECID) 10 Hardware Metering n Hardware metering

4

HW Threats

IP Vendor

System Integrator

Manufacture

Untrusted

IP Trust

IC Trust

Page 5: Introduction to Hardware Security & Trust University of Floridatehranipoor.ece.ufl.edu/05 Hardware Metering.pdf · 2018-03-10 · ID (ECID) 10 Hardware Metering n Hardware metering

5

HW Threats

IP Vendor

System Integrator

Manufacture

Untrusted

IP PiracySystem Trust

IC Trust

Page 6: Introduction to Hardware Security & Trust University of Floridatehranipoor.ece.ufl.edu/05 Hardware Metering.pdf · 2018-03-10 · ID (ECID) 10 Hardware Metering n Hardware metering

6

HW Threats

IP Vendor

System Integrator

Manufacture

UntrustedIC Trust

IC Piracy (Counterfeiting)Secure Manufacturing Test

Untrusted Foundry

Page 7: Introduction to Hardware Security & Trust University of Floridatehranipoor.ece.ufl.edu/05 Hardware Metering.pdf · 2018-03-10 · ID (ECID) 10 Hardware Metering n Hardware metering

Chip Production Flow

8 February 2018 7

n Little communication between IP Owner and Foundry.

n Foundry is trusted with full design.

n Responsible for production of requested amount of chips.

n IP holder provides foundry/assembly with all test patterns and responses.

Page 8: Introduction to Hardware Security & Trust University of Floridatehranipoor.ece.ufl.edu/05 Hardware Metering.pdf · 2018-03-10 · ID (ECID) 10 Hardware Metering n Hardware metering

8 February 2018 8

Chip Production Flow

n Foundry looks for its own profit.

n Once mask is produced, producing IC’s is simple and cheap.

n Lack of communication makes it difficult for owner to track produced chips.

IP Piracy

Cloned ICs, remarked ICs, Recycled ICs

Page 9: Introduction to Hardware Security & Trust University of Floridatehranipoor.ece.ufl.edu/05 Hardware Metering.pdf · 2018-03-10 · ID (ECID) 10 Hardware Metering n Hardware metering

Need for Hardware Metering

n Need for better communication between IP Owner and foundry/assembly.

n Need for IP Owner to be able to track produced chips.

8 February 2018 9

Electronic Chip ID (ECID)

Page 10: Introduction to Hardware Security & Trust University of Floridatehranipoor.ece.ufl.edu/05 Hardware Metering.pdf · 2018-03-10 · ID (ECID) 10 Hardware Metering n Hardware metering

10

Hardware Meteringn Hardware metering (IC metering):

q Set of security protocols that enable IP owners to achieve post-fabrication control over their ICs

q Methods attempt to uniquely tag each chip to facilitate tracing them

q Two main methods: n Active meteringn Passive metering

n Could be applicable to PCBs, e.g., IoTs

Page 11: Introduction to Hardware Security & Trust University of Floridatehranipoor.ece.ufl.edu/05 Hardware Metering.pdf · 2018-03-10 · ID (ECID) 10 Hardware Metering n Hardware metering

Taxonomy of Metering Methods

8 February 2018 11

Hardware Metering

Passive

Active

FunctionalIdentification

Reproducible

External control

Internal control

Unclonable

NonfunctionalIdentification

Digital

Analog

Digital

Analog

Reproducible

Unclonable

Reproducible

Unclonable

Reproducible

Unclonable

Page 12: Introduction to Hardware Security & Trust University of Floridatehranipoor.ece.ufl.edu/05 Hardware Metering.pdf · 2018-03-10 · ID (ECID) 10 Hardware Metering n Hardware metering

Passive Metering

n ICs can be passively monitored.n Can be achieved by physically identifying:

q Serial numbers on chipsq Storing unique identifiers in memory. These are called

Nonfunctional Identificationn E.g., Electronic Chip ID (ECID)

n Tagging an IC’s functionality: Functional Identification

8 February 2018 12

Page 13: Introduction to Hardware Security & Trust University of Floridatehranipoor.ece.ufl.edu/05 Hardware Metering.pdf · 2018-03-10 · ID (ECID) 10 Hardware Metering n Hardware metering

Taxonomy of Metering Methods

8 February 2018 13

Hardware Metering

Passive

Active

FunctionalIdentification

Reproducible

External control

Internal control

Unclonable

NonfunctionalIdentification

Digital

Analog

Digital

Analog

Reproducible

Unclonable

Reproducible

Unclonable

Reproducible

Unclonable

Page 14: Introduction to Hardware Security & Trust University of Floridatehranipoor.ece.ufl.edu/05 Hardware Metering.pdf · 2018-03-10 · ID (ECID) 10 Hardware Metering n Hardware metering

Nonfunctional Identification

n Unique ID is separate from the chip’s functionality.

n Vulnerable to cloning and/or removal.q Once chip is tagged, foundry can copy same tag on other chips or

simply remove tag so chip cannot be traced.

n Possible to overproduce.q Foundry can produce multiple chips with same tag. q Out of millions of chips, probability of finding two matching tags is

small.

n Two main types:q Reproducibleq Unclonable

8 February 2018 14

Page 15: Introduction to Hardware Security & Trust University of Floridatehranipoor.ece.ufl.edu/05 Hardware Metering.pdf · 2018-03-10 · ID (ECID) 10 Hardware Metering n Hardware metering

Nonfunctional Identification: Reproducible Identifiers

8 February 2018 15

n Unique ID’s are stored on the chip package, on die, or in a memory on-chip.

n Examples:q Indented serial numbersq Digitally stored serial numbers

n Advantages:q Do not depend on randomnessq Easy to track / identify.

n Disadvantages:q Easy to clone/modifyq Easy to overproduce

Page 16: Introduction to Hardware Security & Trust University of Floridatehranipoor.ece.ufl.edu/05 Hardware Metering.pdf · 2018-03-10 · ID (ECID) 10 Hardware Metering n Hardware metering

Nonfunctional Identification: Unclonable Identifiers

n Uses random process variations in silicon to generate random unique numbers called fingerprints.

n If additional logic is needed to generate these value, the method is said to be extrinsic.

n If no additional logic is needed, the method is called intrinsic.n Advantages:

q Values cannot be reproduced due to randomness in process variations

n Disadvantages:q Foundry could overproduce ICs without knowledge of IP owner

n i.e., these methods do not prevent counterfeiting. The over-produced chip can be detected if IP owner gets his/her hands on those chips by comparing the identifier on the chip with his/her database

8 February 2018 16

Page 17: Introduction to Hardware Security & Trust University of Floridatehranipoor.ece.ufl.edu/05 Hardware Metering.pdf · 2018-03-10 · ID (ECID) 10 Hardware Metering n Hardware metering

Unclonable Identifiersn Extrinsic methods:

q Require additional logic such as PUF (Physical Unclonable Function) or ICID

q ICIDn Threshold mismatches in array of transistors incurred different currents and

therefore unique random numbers.

q PUFsn Series of ring oscillators (ROs) generate random value due to process variations.

n Intrinsic methods:q Unique identification if external test vectors can be applied.q Uses IC leakage, power, timing, and path signatures (unique due

to process variations).q Does not need additional logic and can be readily used on existing

designs

8 February 2018 17

Page 18: Introduction to Hardware Security & Trust University of Floridatehranipoor.ece.ufl.edu/05 Hardware Metering.pdf · 2018-03-10 · ID (ECID) 10 Hardware Metering n Hardware metering

8 February 2018 18

Taxonomy of Metering Methods

Hardware Metering

Passive

Active

FunctionalIdentification

Reproducible

External control

Internal control

Unclonable

NonfunctionalIdentification

Digital

Analog

Digital

Analog

Reproducible

Unclonable

Reproducible

Unclonable

Reproducible

Unclonable

Page 19: Introduction to Hardware Security & Trust University of Floridatehranipoor.ece.ufl.edu/05 Hardware Metering.pdf · 2018-03-10 · ID (ECID) 10 Hardware Metering n Hardware metering

Functional Meteringn Identifiers linked to chip’s internal functional details during

synthesis.n Each chip’s function gets a unique signature.

q E.g., additional states added to generate same output

n Function unchanged from input to output

n Internal transactions unique to each chip

n Challenge in fabricating ICs with different paths from same mask.

8 February 2018 19

Page 20: Introduction to Hardware Security & Trust University of Floridatehranipoor.ece.ufl.edu/05 Hardware Metering.pdf · 2018-03-10 · ID (ECID) 10 Hardware Metering n Hardware metering

Functional Metering

n One method is fabricating chips from same mask and maintaining one programmable path. q E.g., Datapath could be programmed post-silicon.q IP Owner provides correct input/key combination to foundry to

program chip post-silicon.n Additional work proposes adding redundant states.

q Programmable read logic enables selecting correct permutation for a control sequence.

n Drawbacks:q Testing such circuitry provides low coverage because the actual

functionality of the chip is hidden during the test process by foundry and assembly

q It requires the chip to go back to a trusted facility to be activated.

8 February 2018 20

Page 21: Introduction to Hardware Security & Trust University of Floridatehranipoor.ece.ufl.edu/05 Hardware Metering.pdf · 2018-03-10 · ID (ECID) 10 Hardware Metering n Hardware metering

8 February 2018 21

Taxonomy of Metering Methods

Hardware Metering

Passive

Active

FunctionalIdentification

Reproducible

External control

Internal control

Unclonable

NonfunctionalIdentification

Digital

Analog

Digital

Analog

Reproducible

Unclonable

Reproducible

Unclonable

Reproducible

Unclonable

Page 22: Introduction to Hardware Security & Trust University of Floridatehranipoor.ece.ufl.edu/05 Hardware Metering.pdf · 2018-03-10 · ID (ECID) 10 Hardware Metering n Hardware metering

Active Metering

n Provides active way for designer to enable, control, or disable IC.

n Unlike passive metering, active metering requires communication between design house (IP owner) and foundry.

n Two types: q Internalq External

8 February 2018 22

Page 23: Introduction to Hardware Security & Trust University of Floridatehranipoor.ece.ufl.edu/05 Hardware Metering.pdf · 2018-03-10 · ID (ECID) 10 Hardware Metering n Hardware metering

8 February 2018 23

Taxonomy of Metering Methods

Hardware Metering

Passive

Active

FunctionalIdentification

Reproducible

External control

Internal control

Unclonable

NonfunctionalIdentification

Digital

Analog

Digital

Analog

Reproducible

Unclonable

Reproducible

Unclonable

Reproducible

Unclonable

Page 24: Introduction to Hardware Security & Trust University of Floridatehranipoor.ece.ufl.edu/05 Hardware Metering.pdf · 2018-03-10 · ID (ECID) 10 Hardware Metering n Hardware metering

Internal (Integrated) Active Metering

n Hides states and transition in the design that can only be accessed by designer.

n Locks are embedded within structure of computation model in hardware design in form of FSM.

n Adding additional states or duplicating certain states in FSM adds ability for designer to decide which datapath (sequence of states) to use post-silicon.q Since states are added, specific combinations are needed to bring

FSM to correct output. Only IP owner knows such combination.

8 February 2018 24

Page 25: Introduction to Hardware Security & Trust University of Floridatehranipoor.ece.ufl.edu/05 Hardware Metering.pdf · 2018-03-10 · ID (ECID) 10 Hardware Metering n Hardware metering

P0 P1

P2Start

S1

S0 S2 S6

S7S8

S3

S4 0

Obfuscated Mode(Incorrect function)

Normal Mode(Correct function)

R2 R3

R6

R5

R4

R1

M2

n2 n΄2

g2

State Elements (SE)

Inserted FSM

f2

M1

n1 n΄1

g1

f1

M3

n3 n΄3

g3

f3

Prim

ary

Inpu

ts

Primary O

utputs

Inserted SE

Combinational Logic

Modification Cell

S3S4

P3P4

P5

S0 S1 TkT1 T2 Sn

Original SE

Enabling Key: {P0, P1, P2}

Basic Idea:● A locking approach where normal behavior is enabledonly upon appn. of a key● Provable robustness

Protects against Piracy, RE & Tampering

Key Innovations:● It obfuscates the state space AND the comb. logic● Uses rich theory of automata to transform the state space & associated logic

State Space Obfuscation

Page 26: Introduction to Hardware Security & Trust University of Floridatehranipoor.ece.ufl.edu/05 Hardware Metering.pdf · 2018-03-10 · ID (ECID) 10 Hardware Metering n Hardware metering

The Flow

Analyze input netlist to identify suitable nodes {S} for structural mod.

Design modification cells and insert them in {S}

Create a separate FSM (OFSM) using additional state elements (SEs)

Integrate OFSM with original FSM

Perform constrained logic synthesis; Add active monitors in obf. space

Input: Netlist Const. Key

Output: Obfuscated Netlist

• Affects the dynamic behavior of the machine

• Transforms underlying state machine

S0

S1

S3

S2

S4

K1

K2

P1

P2P3K3

Page 27: Introduction to Hardware Security & Trust University of Floridatehranipoor.ece.ufl.edu/05 Hardware Metering.pdf · 2018-03-10 · ID (ECID) 10 Hardware Metering n Hardware metering

1. How to measure level of obfuscation?2. How to measure the corresponding security benefit?

ICCAD’08 | TCAD’09Original Circuit Obfuscated Circuit

Number of points failing formal verification!

Improvement in Trojan coverage (w.r.t. defense against Trojan attacks)!

Challenges

Page 28: Introduction to Hardware Security & Trust University of Floridatehranipoor.ece.ufl.edu/05 Hardware Metering.pdf · 2018-03-10 · ID (ECID) 10 Hardware Metering n Hardware metering

Internal (Integrated) Active Metering

n States and transitions for controlling chips are integrated within functional specifications

n K = log2(S) flip flops needed to implement S states

n Adding S1 states requires K1=log(S1+S) flip flops

n Few additional flip flops can exponentially increase the number of states.

8 February 2018 28

Page 29: Introduction to Hardware Security & Trust University of Floridatehranipoor.ece.ufl.edu/05 Hardware Metering.pdf · 2018-03-10 · ID (ECID) 10 Hardware Metering n Hardware metering

Internal (Integrated) Active Metering

n PUF generates random values, it sends device to random FSM state.

n Only IP owner with knowledge of FSM can find correct sequence to set FSM to reset state.

n Storing a sequence on chip requires additional logic such as clocks and memory and also requires chip to wait until entire sequence has been shifted in.

8 February 2018 29

Page 30: Introduction to Hardware Security & Trust University of Floridatehranipoor.ece.ufl.edu/05 Hardware Metering.pdf · 2018-03-10 · ID (ECID) 10 Hardware Metering n Hardware metering

8 February 2018 30

Taxonomy of Metering Methods

Hardware Metering

Passive

Active

FunctionalIdentification

Reproducible

External control

Internal control

Unclonable

NonfunctionalIdentification

Digital

Analog

Digital

Analog

Reproducible

Unclonable

Reproducible

Unclonable

Reproducible

Unclonable

Page 31: Introduction to Hardware Security & Trust University of Floridatehranipoor.ece.ufl.edu/05 Hardware Metering.pdf · 2018-03-10 · ID (ECID) 10 Hardware Metering n Hardware metering

External Active Metering

n Uses external asymmetric cryptographic techniques to lock IC.

n Cryptographic circuits rely on public and private keys to give IP owner control over activation/correct function of the circuit.

n Only IP owner knows private key to unlock IC’s functionality or testability.

8 February 2018 31

Page 32: Introduction to Hardware Security & Trust University of Floridatehranipoor.ece.ufl.edu/05 Hardware Metering.pdf · 2018-03-10 · ID (ECID) 10 Hardware Metering n Hardware metering

Background: Public Key Cryptography

n Uses two large prime numbers p and q to generate co-prime n=pq

n Private (d) and public (e) keys based on n, p, and q are calculatedq (e,n) are shared, message is encrypted

using (d,n)q Decryption can be done using (e,n)

n Security relies on magnitude of prime numbers p and q

8 February 2018 32

Page 33: Introduction to Hardware Security & Trust University of Floridatehranipoor.ece.ufl.edu/05 Hardware Metering.pdf · 2018-03-10 · ID (ECID) 10 Hardware Metering n Hardware metering

EPIC: Ending Piracy of Integrated Circuits

8 February 2018 33

n This technique tries to allow IP Owner to have control over number of chips activated.

n Uses public-key encryption to lock correct functionality of chip.

n At the gate level, XOR gates are placed on selected non-critical paths.

n Requires that every chip be activated with an external keyq Only IP owner can generate key

Non-critical Path

KeyOutput

Roy et al., DATE 2008

Page 34: Introduction to Hardware Security & Trust University of Floridatehranipoor.ece.ufl.edu/05 Hardware Metering.pdf · 2018-03-10 · ID (ECID) 10 Hardware Metering n Hardware metering

EPIC High Level

8 February 2018 34

CHIP at Foundry IP Owner

MK-public(embedded) RCK-PublicMK-private

RSACK

(Common among all ICs)RSACK

XOR IKInputs

Outputs

Send RCK-Public to

IP Owner

Send IK to

foundry

Encrypt CK using MK-pri and RCK-pub =>IK

On power-up:RCK-PublicRCK-Private

(From TRNG)

Page 35: Introduction to Hardware Security & Trust University of Floridatehranipoor.ece.ufl.edu/05 Hardware Metering.pdf · 2018-03-10 · ID (ECID) 10 Hardware Metering n Hardware metering

35

EPIC

n Embedded in RTL is public Master Key (MK-Pub)

n XOR gates are controlled by Common Key. Correct Common Key unlocks circuit’s correct functionality.q k-XOR gates need a common key of length k

n TRNG (True Random Number Generator) used to generate Random Chip Keys (RCK) on start up.q Upon power-up each chip generates a pair of private and public RCKs

(RCK-private, RCK-public) which are burned into programmable fuses.

n Fab sends RCK-public to IP owner.

Page 36: Introduction to Hardware Security & Trust University of Floridatehranipoor.ece.ufl.edu/05 Hardware Metering.pdf · 2018-03-10 · ID (ECID) 10 Hardware Metering n Hardware metering

Analysis of EPICn Effective against cloned ICs.

q Cloned ICs: Due to TRNG, each IC will have a unique random key, even cloned ICs. ICs need IK in order to be functional which only IP owner can generate.

n Not efficient against Over-produced ICs, Out-of-Spec ICs and defective ICs.q Over-produced ICs:

n Fab could claim low yield and request more IKs than needed.n IP Owner has no way to verify yield or number of functional chips.n Foundry can still send keys to IP Owner. Keys are randomly generated and have no

information on functionality of the IC.

q Out-of-Spec ICs:n Foundry/assembly can send out the chip that are out of spec (their ID is a correct

one)

q Defective ICs:n Once IP owner sends Input Key, chip is activated. If chip is defective, IP Owner

has no more communication with foundry and chip is already activated.

8 February 2018 36

Page 37: Introduction to Hardware Security & Trust University of Floridatehranipoor.ece.ufl.edu/05 Hardware Metering.pdf · 2018-03-10 · ID (ECID) 10 Hardware Metering n Hardware metering

Reconfigurable Logic Barriers (LB)

n Separates inputs from outputs such that every path from input to output passes through a barrier.

n Logic barrier (LB) is a group of logic that allows correct path only if correct key is applied.

8 February 2018 37

Page 38: Introduction to Hardware Security & Trust University of Floridatehranipoor.ece.ufl.edu/05 Hardware Metering.pdf · 2018-03-10 · ID (ECID) 10 Hardware Metering n Hardware metering

Reconfigurable Logic Barriers

n IP owner decomposes IC functionality into Ffixed and Freconfig.

n Ffixed is given to foundry to fabricate.

n Freconfig is location of reconfigurable logic in combination with key needed to configure them correctly

n Freconfig can be programmed into reconfigurable locations using a secure key.

8 February 2018 38

Page 39: Introduction to Hardware Security & Trust University of Floridatehranipoor.ece.ufl.edu/05 Hardware Metering.pdf · 2018-03-10 · ID (ECID) 10 Hardware Metering n Hardware metering

LB: Public Key Cryptography

n ICs use PUFs or TRNGs to generate a private and public random keys.q Public key from chip is sent to IP Owner

n IP Owner uses public key and its own private key to encrypt unlocking key.q Encrypted key is decrypted on chip using IP Owner’s public key and

chip’s private key.

8 February 2018 39

Page 40: Introduction to Hardware Security & Trust University of Floridatehranipoor.ece.ufl.edu/05 Hardware Metering.pdf · 2018-03-10 · ID (ECID) 10 Hardware Metering n Hardware metering

LB: Partitioning of Design

8 February 2018 40

Page 41: Introduction to Hardware Security & Trust University of Floridatehranipoor.ece.ufl.edu/05 Hardware Metering.pdf · 2018-03-10 · ID (ECID) 10 Hardware Metering n Hardware metering

Logic Barriers Analysis

n Effective against cloned ICs.q Chips are only functional if correct key is entered which only IP Owner

can provide

n Ineffective against over-produced, defective, and out-of-spec ICsq Foundry can lower yield in order to receive additional keys to activate

functionality.q Key generated by chip does not have information about its

functionality. Once key is applied, chip is functional.

n Disadvantages:q Look up tables require significant area overhead – 5X more than

using XOR gates, and timing overhead.

8 February 2018 41

Page 42: Introduction to Hardware Security & Trust University of Floridatehranipoor.ece.ufl.edu/05 Hardware Metering.pdf · 2018-03-10 · ID (ECID) 10 Hardware Metering n Hardware metering

Test Seems to be a Challenge!

8 February 2018 42

Designer

Foundry & Assembly

Most techniques do not take into account the role “test” plays in the

decision making process

Page 43: Introduction to Hardware Security & Trust University of Floridatehranipoor.ece.ufl.edu/05 Hardware Metering.pdf · 2018-03-10 · ID (ECID) 10 Hardware Metering n Hardware metering

Secure Split-Test (SST)

n Adds multiple layers of communication between IP owner, foundry, and assembly

n Ensures that IP owner will know exactly how many chips pass the test and how many have failed.

n Only chips that IP Owner has deemed functional will be given a functional key.

8 February 2018 43

Page 44: Introduction to Hardware Security & Trust University of Floridatehranipoor.ece.ufl.edu/05 Hardware Metering.pdf · 2018-03-10 · ID (ECID) 10 Hardware Metering n Hardware metering

Secure Split-Test

8 February 2018 44

Page 45: Introduction to Hardware Security & Trust University of Floridatehranipoor.ece.ufl.edu/05 Hardware Metering.pdf · 2018-03-10 · ID (ECID) 10 Hardware Metering n Hardware metering

XOR Mask

n Three-input XOR logic added to non-critical paths.n XOR logic additional inputs are IN1 and IN2

8 February 2018 45

IN1IN2

Page 46: Introduction to Hardware Security & Trust University of Floridatehranipoor.ece.ufl.edu/05 Hardware Metering.pdf · 2018-03-10 · ID (ECID) 10 Hardware Metering n Hardware metering

SST

8 February 2018 46

Page 47: Introduction to Hardware Security & Trust University of Floridatehranipoor.ece.ufl.edu/05 Hardware Metering.pdf · 2018-03-10 · ID (ECID) 10 Hardware Metering n Hardware metering

SST Analysis

n Effective against overproduced ICs, cloned ICs, and defective ICsq Overproduced:

n IP Owner has control over number of TRNs received and TKEY/FKEYS sent to foundry/assembly

q Cloned:n Chips are not functional unless FKEY has been produced by IP Owner

q Defective ICs:n Foundry sends test results to foundry who checks results and decides if

chip has correct test responses (chip is not yet functional at this stage)

8 February 2018 47

Page 48: Introduction to Hardware Security & Trust University of Floridatehranipoor.ece.ufl.edu/05 Hardware Metering.pdf · 2018-03-10 · ID (ECID) 10 Hardware Metering n Hardware metering

SST Analysis

n Prevents out-of-spec ICsq Some specifications cannot be determined from patterns testing

alone. If a chip does not meet these specifications, it could be considered as a passing chip.

q With the addition of a few sensors on the chip, these specifications can be tested and checked by IP Owner during SST

q The IP owner will then be able to decide whether or not a chip passes the desired specifications in order to prevent out-of-spec ICs from going into market.

8 February 2018 48

Page 49: Introduction to Hardware Security & Trust University of Floridatehranipoor.ece.ufl.edu/05 Hardware Metering.pdf · 2018-03-10 · ID (ECID) 10 Hardware Metering n Hardware metering

Remote Activation of ICs Through FSM Modification

n FSM: Finite State Machinen Sequence of inputs drive machine through

different functional statesn Correct transitions give functional output

8 February 2018 49

Page 50: Introduction to Hardware Security & Trust University of Floridatehranipoor.ece.ufl.edu/05 Hardware Metering.pdf · 2018-03-10 · ID (ECID) 10 Hardware Metering n Hardware metering

FSM

8 February 2018 50

n Correct transitions give functional output

n Adding states to FSM gives IP owner controllability over sequence to reach functional states.

Page 51: Introduction to Hardware Security & Trust University of Floridatehranipoor.ece.ufl.edu/05 Hardware Metering.pdf · 2018-03-10 · ID (ECID) 10 Hardware Metering n Hardware metering

Boosted FSM (BFSM)

8 February 2018 51

n On startup, inputs cause chip to go to one of added states

n IP Owner is only one with knowledge of FSM

n Only IP Owner knows right sequence (key) to bring FSM back to functional states.

Page 52: Introduction to Hardware Security & Trust University of Floridatehranipoor.ece.ufl.edu/05 Hardware Metering.pdf · 2018-03-10 · ID (ECID) 10 Hardware Metering n Hardware metering

Remote Activation of ICs

8 February 2018 52

n Redundant states are added.

n Far less states needed than BFSM

n PUF response will send FSM to one of redundant states.

n Challenge: PUF is yet to be reliable.

Page 53: Introduction to Hardware Security & Trust University of Floridatehranipoor.ece.ufl.edu/05 Hardware Metering.pdf · 2018-03-10 · ID (ECID) 10 Hardware Metering n Hardware metering

Remote Activation of ICs

n RUB: Random Unique Block

n RUB must be stable – not change over time

n PUF (RUB) response is sent to IP Owner to generate key

n Key is then used to send FSM to correct state.

8 February 2018 53

Page 54: Introduction to Hardware Security & Trust University of Floridatehranipoor.ece.ufl.edu/05 Hardware Metering.pdf · 2018-03-10 · ID (ECID) 10 Hardware Metering n Hardware metering

Analysis of Boosted FSM and Remote Activation

n BFSM requires many additional FSM states.

n Remote activation only uses a few redundant states.

n Both use PUF which is affected by age, temperature, noise, etc.

n Both effective against cloned ICs but not effective against defective, over-produced, or out-of-spec ICs.

8 February 2018 54

Page 55: Introduction to Hardware Security & Trust University of Floridatehranipoor.ece.ufl.edu/05 Hardware Metering.pdf · 2018-03-10 · ID (ECID) 10 Hardware Metering n Hardware metering

Referencesn F. Koushanfar and G Qu. Hardware Metering. In DAC 2001, 2001n Y. Alkabani and F. Koushanfar. Active Hardware Metering for Intellectual Property Protection and

Security. In USENIX Security, 2007n F. Koushanfar, G. Qu, and M. Potkonjak. Intellectual Property Metering. In IH, pp.81-95, 2001.n J.A. Roy, F. Koushanfar, and I.L. Markov. EPIC: Ending Piracy of Integrated Circuits. In EDAA, 2008.n A. Boumgarten, A. Tyagi, and J. Zambreno. Preventing IC Piracy Using Reconfigurable Logic Barriers. In

IEEE Design and Test of Computers, 2010n M. Tehranipoor and C. Wang. Introduction to Hardware Security. Springer, pp. 103-120, 2012n Y. Alkabani, F. Koushanfar, M Potkonjak. Remote Activation of ICs for Piracy Prevention and Digital

Rights Management. In IEEE, 2007n M. Tehranipoor. VLSI Design Verification and Testing: Test Economics.

http://www.engr.uconn.edu/~tehrani/teaching/test/03_Test%20Economics%20and%20Product%20Quality.pdf

n R.L. Rivest, A. Shamir, and L. Adleman. A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Communication of the ACM, 1978.

n G. Contreras, T. Rahman, and M. Tehranipoor, ” Secure Split-Test for Preventing IC Piracy by Untrusted Foundry and Assembly," Int. Symposium on Defect and Fault Tolerance in VLSI Systems (DFT), 2013.

n T. Rahman, D. Forte, Q. Shi, G. Contreras, and M. Tehranipoor, "CSST: Preventing Distribution of Unlicensed and Rejected ICs by Untrusted Foundry and Assembly,” IEEE Int. Symposium on Defect and Fault Tolerance Symposium (DFTS), Oct. 2014.

n

n

8 February 2018 55