Sie verwenden einen Browser, in dem JavaScript deaktiviert ist. Dadurch wird verhindert, dass Sie die volle Funktionalität dieser Webseite nutzen können. Zur Navigation müssen Sie daher die Sitemap nutzen.

You are currently using a browser with deactivated JavaScript. There you can't use all the features of this website. In order to navigate the site, please use the Sitemap .

Protecting the Integrity of Processor Cores with Logic Encryption

Šišejković, D.Merchant, F.Leupers, R.
Book Title:
2019 32nd IEEE International System-on-Chip Conference (SOCC)
p.p. 424-425


Malicious circuit modifications known as hardware Trojans represent a rising threat to the integrated circuit supply chain. Logic encryption has emerged as a prominent technique for protecting the integrity of circuit designs. In recent years, an extensive amount of logic encryption algorithms have been introduced. However, existing approaches focus on isolated circuit components without considering the modularity and complexity of modern hardware designs. In this work, we focus on several aspects of protecting modern processor core designs. Firstly, we discuss Inter-Lock, a novel approach to scaling logic encryption to multi-module hardware designs by leveraging inter-module dependencies. Inter-Lock is efficiently able to exponentially increase the security and render attacks on isolated modules infeasible by undermining the basic assumption that the key inputs are known. Secondly, we present Control-Lock, a methodology for protecting critical inter-module control signals in hardware designs against software-controlled hardware Trojans. Both techniques are evaluated on a RISC-V processor core with respect to the area, delay and power overhead. Lastly, we briefly discuss a unifying logic encryption metric as well as acceptable overheads for widely used benchmarks.



Copyright © by IEEE
© 2021 IEEE.Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.