Bradley D. Christiansen, Yong C. Kim, R. Bennington, Christopher J. Ristich
{"title":"用于FPGA保护的诱饵电路设计","authors":"Bradley D. Christiansen, Yong C. Kim, R. Bennington, Christopher J. Ristich","doi":"10.1109/FPT.2006.270351","DOIUrl":null,"url":null,"abstract":"Field-programmable gate arrays (FPGAs) are increasingly used in system designs, but their vulnerability to reverse engineering could lead to lost profits or security breaches. Thus, high FPGA design security is needed with low performance penalties and low realization and maintenance costs. Using a novel circuit modification method, common circuits were augmented with decoy circuits for protection. Security values for the original and modified circuits were calculated, and the original and modified circuits' execution times, power consumptions, and resource usages were collected from simulations. For the modified circuits, security improved by six orders of magnitude, yet execution times, power consumption, and resource usage increased by less than one order of magnitude. The proposed algorithm has demonstrated the potential for substantial increases in FPGA design security at a low cost, and could also be applied to application-specific integrated circuits (ASICs)","PeriodicalId":354940,"journal":{"name":"2006 IEEE International Conference on Field Programmable Technology","volume":"32 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2006-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"Decoy circuits for FPGA design protection\",\"authors\":\"Bradley D. Christiansen, Yong C. Kim, R. Bennington, Christopher J. Ristich\",\"doi\":\"10.1109/FPT.2006.270351\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Field-programmable gate arrays (FPGAs) are increasingly used in system designs, but their vulnerability to reverse engineering could lead to lost profits or security breaches. Thus, high FPGA design security is needed with low performance penalties and low realization and maintenance costs. Using a novel circuit modification method, common circuits were augmented with decoy circuits for protection. Security values for the original and modified circuits were calculated, and the original and modified circuits' execution times, power consumptions, and resource usages were collected from simulations. For the modified circuits, security improved by six orders of magnitude, yet execution times, power consumption, and resource usage increased by less than one order of magnitude. The proposed algorithm has demonstrated the potential for substantial increases in FPGA design security at a low cost, and could also be applied to application-specific integrated circuits (ASICs)\",\"PeriodicalId\":354940,\"journal\":{\"name\":\"2006 IEEE International Conference on Field Programmable Technology\",\"volume\":\"32 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2006-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2006 IEEE International Conference on Field Programmable Technology\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/FPT.2006.270351\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2006 IEEE International Conference on Field Programmable Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/FPT.2006.270351","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Field-programmable gate arrays (FPGAs) are increasingly used in system designs, but their vulnerability to reverse engineering could lead to lost profits or security breaches. Thus, high FPGA design security is needed with low performance penalties and low realization and maintenance costs. Using a novel circuit modification method, common circuits were augmented with decoy circuits for protection. Security values for the original and modified circuits were calculated, and the original and modified circuits' execution times, power consumptions, and resource usages were collected from simulations. For the modified circuits, security improved by six orders of magnitude, yet execution times, power consumption, and resource usage increased by less than one order of magnitude. The proposed algorithm has demonstrated the potential for substantial increases in FPGA design security at a low cost, and could also be applied to application-specific integrated circuits (ASICs)