论文标题
数字FIR滤波器的硬件混淆
Hardware Obfuscation of Digital FIR Filters
论文作者
论文摘要
有限的脉冲响应(FIR)过滤器是数字信号处理应用中无处不在的块。它的特性取决于其系数,这些系数是其设计师的知识产权(IP)。但是,在有效的硬件有效实现中,其系数变得容易受到反向工程的影响。本文提出了一种可以保护此IP的过滤器设计技术,考虑了硬件的复杂性,并确保仅在提供秘密键时才指定过滤器。为此,系数隐藏在诱饵之间,使用三种替代方法,这些系数超出了系数的可能值。作为攻击情况,考虑了不信任的铸造厂的对手。开发了一种逆向工程技术来找到所选的诱饵选择方法,并通过诱饵探索系数的潜在泄漏。无甲骨文的攻击也用于查找秘密钥匙。实验结果表明,提出的技术可以导致具有竞争性硬件复杂性的过滤设计,并且相对于先前提出的方法,对攻击具有更高的弹性。
A finite impulse response (FIR) filter is a ubiquitous block in digital signal processing applications. Its characteristics are determined by its coefficients, which are the intellectual property (IP) for its designer. However, in a hardware efficient realization, its coefficients become vulnerable to reverse engineering. This paper presents a filter design technique that can protect this IP, taking into account hardware complexity and ensuring that the filter behaves as specified only when a secret key is provided. To do so, coefficients are hidden among decoys, which are selected beyond possible values of coefficients using three alternative methods. As an attack scenario, an adversary at an untrusted foundry is considered. A reverse engineering technique is developed to find the chosen decoy selection method and explore the potential leakage of coefficients through decoys. An oracle-less attack is also used to find the secret key. Experimental results show that the proposed technique can lead to filter designs with competitive hardware complexity and higher resiliency to attacks with respect to previously proposed methods.