Published May 1, 2017 | Version v1
Presentation Open

Complete activation scheme for IP design protection

  • 1. Hubert Curien Laboratory, University of Lyon
  • 2. Department of Electronics and Multimedia Communications, Technical University of Kosice

Description

Intellectual Property (IP) illegal copying is a major threat in today’s integrated circuits industry which is massively based on a design-and-reuse paradigm. In order to fight this threat, a designer must track how many times an IP has been instantiated. Moreover, illegal copies of an IP must be unusable. We propose a hardware/software scheme which allows a designer to remotely activate an IP with minimal area overhead. The software modifies the IP efficiently and can handle very large netlists. Unique identification of hardware instances is achieved by integrating a TERO-PUF along with a lightweight key reconciliation module. A cryptographic core guarantees security and triggers a logic locking/masking module which makes the IP unusable unless the correct encrypted activation word is applied. The hardware side is implemented on several FPGAs.

Files

HOST-complete-activation-scheme-IP-short.pdf

Files (164.1 kB)

Name Size Download all
md5:83becc6678e5e2c3b1c16e4528da3a72
164.1 kB Preview Download

Additional details

Funding

HECTOR – HARDWARE ENABLED CRYPTO AND RANDOMNESS 644052
European Commission