1,147 research outputs found

    Reconfigurable logic for hardware IP protection: Opportunities and challenges

    Get PDF
    Protecting the intellectual property (IP) of integrated circuit (IC) design is becoming a significant concern of fab-less semiconductor design houses. Malicious actors can access the chip design at any stage, reverse engineer the functionality, and create illegal copies. On the one hand, defenders are crafting more and more solutions to hide the critical portions of the circuit. On the other hand, attackers are designing more and more powerful tools to extract useful information from the design and reverse engineer the functionality, especially when they can get access to working chips. In this context, the use of custom reconfigurable fabrics has recently been investigated for hardware IP protection. This paper will discuss recent trends in hardware obfuscation with embedded FPGAs, focusing also on the open challenges that must be necessarily addressed for making this solution viable

    Invited: High-level design methods for hardware security: Is it the right choice?

    Get PDF
    Due to the globalization of the electronics supply chain, hardware engineers are increasingly interested in modifying their chip designs to protect their intellectual property (IP) or the privacy of the final users. However, the integration of state-of-the-art solutions for hardware and hardware-assisted security is not fully automated, requiring the amendment of stable tools and industrial toolchains. This significantly limits the application in industrial designs, potentially affecting the security of the resulting chips. We discuss how existing solutions can be adapted to implement security features at higher levels of abstractions (during high-level synthesis or directly at the register-transfer level) and complement current industrial design and verification flows. Our modular framework allows designers to compose these solutions and create additional protection layers

    Designing ML-resilient locking at register-transfer level

    Get PDF
    Various logic-locking schemes have been proposed to protect hardware from intellectual property piracy and malicious design modifications. Since traditional locking techniques are applied on the gate-level netlist after logic synthesis, they have no semantic knowledge of the design function. Data-driven, machine-learning (ML) attacks can uncover the design flaws within gate-level locking. Recent proposals on register-transfer level (RTL) locking have access to semantic hardware information. We investigate the resilience of ASSURE, a state-of-the-art RTL locking method, against ML attacks. We used the lessons learned to derive two ML-resilient RTL locking schemes built to reinforce ASSURE locking. We developed ML-driven security metrics to evaluate the schemes against an RTL adaptation of the state-of-the-art, ML-based SnapShot attack

    Somatic BRCA Mutation in a Cholangiocarcinoma Patient for HBOC Syndrome Detection

    Get PDF
    BRCA-associated hereditary breast and ovarian cancer syndrome (HBOC) is characterized by an increased risk of developing other malignancies including cholangiocarcinoma (CCA). Somatic BRCA mutations have been reported in CCA, but they have yet to be utilized in a proband case to identify HBOC in families. Two healthy daughters of a deceased female patient who had had metachronous breast cancer and CCA received genetic counseling to assess their cancer risk. Somatic BRCA1/2 mutation analysis was performed by next-generation sequencing on the DNA extracted from a formalin-fixed, paraffin-embedded CCA biopsy specimen of their mother. A pathogenic variant was identified (c.6468_6469delTC in a BRCA2 gene mutation). Germline BRCA mutation analysis of the two daughters detected the same pathogenic variant in one of them. For the first time, a CCA somatic BRCA mutation has been used to identify a family with HBOC

    Not All Fabrics Are Created Equal: Exploring eFPGA Parameters for IP Redaction

    Get PDF
    Semiconductor design houses rely on third-party foundries to manufacture their integrated circuits (ICs). While this trend allows them to tackle fabrication costs, it introduces security concerns as external (and potentially malicious) parties can access critical parts of the designs and steal or modify the intellectual property (IP). Embedded field-programmable gate array (eFPGA) redaction is a promising technique to protect critical IPs of an ASIC by redacting (i.e., removing) critical parts and mapping them onto a custom reconfigurable fabric. Only trusted parties will receive the correct bitstream to restore the redacted functionality. While previous studies imply that using an eFPGA is a sufficient condition to provide security against IP threats like reverse-engineering, whether this truly holds for all eFPGA architectures is unclear, thus motivating the study in this article. We examine the security of eFPGA fabrics generated by varying different FPGA design parameters. We characterize the power, performance, and area (PPA) characteristics and evaluate each fabric’s resistance to Boolean satisfiability (SAT)-based bitstream recovery. Our results encourage designers to work with custom eFPGA fabrics rather than off-the-shelf commercial FPGAs and reveals that only considering a redaction fabric’s bitstream size is inadequate for gauging security

    ALICE: An Automatic Design Flow for eFPGA Redaction

    Get PDF
    Fabricating an integrated circuit is becoming unaffordable for many semiconductor design houses. Outsourcing the fabrication to a third-party foundry requires methods to protect the intellectual property of the hardware designs. Designers can rely on embedded reconfigurable devices to completely hide the real functionality of selected design portions unless the configuration string (bitstream) is provided. However, selecting such portions and creating the corresponding reconfigurable fabrics are still open problems. We propose ALICE, a design flow that addresses the EDA challenges of this problem. ALICE partitions the RTL modules between one or more reconfigurable fabrics and the rest of the circuit, automating the generation of the corresponding redacted design

    Purposes, concepts, misfits, and a redesign of git

    Get PDF
    Git is a widely used version control system that is powerful but complicated. Its complexity may not be an inevitable consequence of its power but rather evidence of flaws in its design. To explore this hypothesis, we analyzed the design of Git using a theory that identifies concepts, purposes, and misfits. Some well-known difficulties with Git are described, and explained as misfits in which underlying concepts fail to meet their intended purpose. Based on this analysis, we designed a reworking of Git (called Gitless) that attempts to remedy these flaws. To correlate misfits with issues reported by users, we conducted a study of Stack Overflow questions. And to determine whether users experienced fewer complications using Gitless in place of Git, we conducted a small user study. Results suggest our approach can be profitable in identifying, analyzing, and fixing design problems.SUTD-MIT International Design Centre (IDC

    Spectrum of germline pathogenic variants in brca1/2 genes in the apulian southern italy population: Geographic distribution and evidence for targeted genetic testing

    Get PDF
    BRCA1/2-associated hereditary breast and ovarian cancer is the most common form of hereditary breast and ovarian cancer and occurs in all ethnicities and racial populations. Different BRCA1/BRCA2 pathogenic variants (PVs) have been reported with a wide variety among populations. In this study, we retrospectively analyzed prevalence and geographic distribution of pathogenic germline BRCA1/2 variants in families from Apulia in southern Italy and evaluated the genotype–phenotype correlations. Data were collected from Oncogenetic Services present in Apulian hospitals and a shared database was built containing Apulian native probands (n = 2026) that had undergone genetic testing from 2004 to 2019. PVs were detected in 499 of 2026 (24.6%) probands and 68.5% of them (342 of 499) were in the BRCA1 gene. We found 65 different PVs in BRCA1 and 46 in BRCA2. There were 10 most recurrent PVs and their geographical distribution appears to be significantly specific for each province. We have assumed that these PVs are related to the historical and geopolitical changes that occurred in Apulia over time and/or to a “founder effect”. Broader knowledge of BRCA1/2 prevalence and recurring PVs in specific geographic areas could help establish more flexible genetic testing strategies that may enhance our ability to detect high-risk subjects
    • …
    corecore