{"title":"用于CE器件的DSP核的结构混淆","authors":"A. Sengupta, S. Mohanty","doi":"10.1049/pbcs060e_ch7","DOIUrl":null,"url":null,"abstract":"Previous chapters, watermarking, fingerprinting, and forensic engineering have been discussed for resolving various ownership-related problems. This chapter discusses structural obfuscation approaches to thwart IP piracy and reverse engineering (RE). This approach, when effective, can save billions of dollars of revenue losses in CE and semiconductor industry. Especially, a multi-high-level transformation-based structural obfuscation process has been presented for DSP IP cores as hardware-hardening technique. The chapter is structured as follows: Section 7.2 highlights the fundamentals of obfuscation with stress on structural obfuscation; Section 7.3 discusses different compiler transformation-driven structural obfuscation methodology. Section 7.4 discusses low-cost structurally obfuscated design exploring technique. Section 7.5 demonstrates a multistage structural obfuscation technique through a motivational example. Section 7.6 presents the results of a case study.","PeriodicalId":14528,"journal":{"name":"IP Core Protection and Hardware-Assisted Security for Consumer Electronics","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2019-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Structural obfuscation of DSP cores used in CE devices\",\"authors\":\"A. Sengupta, S. Mohanty\",\"doi\":\"10.1049/pbcs060e_ch7\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Previous chapters, watermarking, fingerprinting, and forensic engineering have been discussed for resolving various ownership-related problems. This chapter discusses structural obfuscation approaches to thwart IP piracy and reverse engineering (RE). This approach, when effective, can save billions of dollars of revenue losses in CE and semiconductor industry. Especially, a multi-high-level transformation-based structural obfuscation process has been presented for DSP IP cores as hardware-hardening technique. The chapter is structured as follows: Section 7.2 highlights the fundamentals of obfuscation with stress on structural obfuscation; Section 7.3 discusses different compiler transformation-driven structural obfuscation methodology. Section 7.4 discusses low-cost structurally obfuscated design exploring technique. Section 7.5 demonstrates a multistage structural obfuscation technique through a motivational example. Section 7.6 presents the results of a case study.\",\"PeriodicalId\":14528,\"journal\":{\"name\":\"IP Core Protection and Hardware-Assisted Security for Consumer Electronics\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-01-30\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"IP Core Protection and Hardware-Assisted Security for Consumer Electronics\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1049/pbcs060e_ch7\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"IP Core Protection and Hardware-Assisted Security for Consumer Electronics","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1049/pbcs060e_ch7","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Structural obfuscation of DSP cores used in CE devices
Previous chapters, watermarking, fingerprinting, and forensic engineering have been discussed for resolving various ownership-related problems. This chapter discusses structural obfuscation approaches to thwart IP piracy and reverse engineering (RE). This approach, when effective, can save billions of dollars of revenue losses in CE and semiconductor industry. Especially, a multi-high-level transformation-based structural obfuscation process has been presented for DSP IP cores as hardware-hardening technique. The chapter is structured as follows: Section 7.2 highlights the fundamentals of obfuscation with stress on structural obfuscation; Section 7.3 discusses different compiler transformation-driven structural obfuscation methodology. Section 7.4 discusses low-cost structurally obfuscated design exploring technique. Section 7.5 demonstrates a multistage structural obfuscation technique through a motivational example. Section 7.6 presents the results of a case study.