17 research outputs found
Scalable Test Generation to Trigger Rare Targets in High-Level Synthesizable IPs for Cloud FPGAs
High-Level Synthesis (HLS) has transformed the development of complex
Hardware IPs (HWIP) by offering abstraction and configurability through
languages like SystemC/C++, particularly for Field Programmable Gate Array
(FPGA) accelerators in high-performance and cloud computing contexts. These IPs
can be synthesized for different FPGA boards in cloud, offering compact area
requirements and enhanced flexibility. HLS enables designs to execute directly
on ARM processors within modern FPGAs without the need for Register Transfer
Level (RTL) synthesis, thereby conserving FPGA resources. While HLS offers
flexibility and efficiency, it also introduces potential vulnerabilities such
as the presence of hidden circuitry, including the possibility of hosting
hardware trojans within designs. In cloud environments, these vulnerabilities
pose significant security concerns such as leakage of sensitive data, IP
functionality disruption and hardware damage, necessitating the development of
robust testing frameworks. This research presents an advanced testing approach
for HLS-developed cloud IPs, specifically targeting hidden malicious
functionalities that may exist in rare conditions within the design. The
proposed method leverages selective instrumentation, combining greybox fuzzing
and concolic execution techniques to enhance test generation capabilities.
Evaluation conducted on various HLS benchmarks, possessing characteristics of
FPGA-based cloud IPs with embedded cloud related threats, demonstrates the
effectiveness of our framework in detecting trojans and rare scenarios,
showcasing improvements in coverage, time efficiency, memory usage, and testing
costs compared to existing methods
INVICTUS: Optimizing Boolean Logic Circuit Synthesis via Synergistic Learning and Search
Logic synthesis is the first and most vital step in chip design. This steps
converts a chip specification written in a hardware description language (such
as Verilog) into an optimized implementation using Boolean logic gates.
State-of-the-art logic synthesis algorithms have a large number of logic
minimization heuristics, typically applied sequentially based on human
experience and intuition. The choice of the order greatly impacts the quality
(e.g., area and delay) of the synthesized circuit. In this paper, we propose
INVICTUS, a model-based offline reinforcement learning (RL) solution that
automatically generates a sequence of logic minimization heuristics ("synthesis
recipe") based on a training dataset of previously seen designs. A key
challenge is that new designs can range from being very similar to past designs
(e.g., adders and multipliers) to being completely novel (e.g., new processor
instructions). %Compared to prior work, INVICTUS is the first solution that
uses a mix of RL and search methods joint with an online out-of-distribution
detector to generate synthesis recipes over a wide range of benchmarks. Our
results demonstrate significant improvement in area-delay product (ADP) of
synthesized circuits with up to 30\% improvement over state-of-the-art
techniques. Moreover, INVICTUS achieves up to runtime reduction
(iso-ADP) compared to the state-of-the-art.Comment: 20 pages, 8 figures and 15 table
ASSURE: RTL Locking Against an Untrusted Foundry
Semiconductor design companies are integrating proprietary intellectual
property (IP) blocks to build custom integrated circuits (IC) and fabricate
them in a third-party foundry. Unauthorized IC copies cost these companies
billions of dollars annually. While several methods have been proposed for
hardware IP obfuscation, they operate on the gate-level netlist, i.e., after
the synthesis tools embed the semantic information into the netlist. We propose
ASSURE to protect hardware IP modules operating on the register-transfer level
(RTL) description. The RTL approach has three advantages: (i) it allows
designers to obfuscate IP cores generated with many different methods (e.g.,
hardware generators, high-level synthesis tools, and pre-existing IPs). (ii) it
obfuscates the semantics of an IC before logic synthesis; (iii) it does not
require modifications to EDA flows. We perform a cost and security assessment
of ASSURE.Comment: Submitted to IEEE Transactions on VLSI Systems on 11-Oct-2020,
28-Jan-202
Targeted Greybox Fuzzing with Static Lookahead Analysis
Automatic test generation typically aims to generate inputs that explore new
paths in the program under test in order to find bugs. Existing work has,
therefore, focused on guiding the exploration toward program parts that are
more likely to contain bugs by using an offline static analysis.
In this paper, we introduce a novel technique for targeted greybox fuzzing
using an online static analysis that guides the fuzzer toward a set of target
locations, for instance, located in recently modified parts of the program.
This is achieved by first semantically analyzing each program path that is
explored by an input in the fuzzer's test suite. The results of this analysis
are then used to control the fuzzer's specialized power schedule, which
determines how often to fuzz inputs from the test suite. We implemented our
technique by extending a state-of-the-art, industrial fuzzer for Ethereum smart
contracts and evaluate its effectiveness on 27 real-world benchmarks. Using an
online analysis is particularly suitable for the domain of smart contracts
since it does not require any code instrumentation---instrumentation to
contracts changes their semantics. Our experiments show that targeted fuzzing
significantly outperforms standard greybox fuzzing for reaching 83% of the
challenging target locations (up to 14x of median speed-up)
ASCENT: Amplifying Power Side-Channel Resilience via Learning & Monte-Carlo Tree Search
Power side-channel (PSC) analysis is pivotal for securing cryptographic
hardware. Prior art focused on securing gate-level netlists obtained as-is from
chip design automation, neglecting all the complexities and potential
side-effects for security arising from the design automation process. That is,
automation traditionally prioritizes power, performance, and area (PPA),
sidelining security. We propose a "security-first" approach, refining the logic
synthesis stage to enhance the overall resilience of PSC countermeasures. We
introduce ASCENT, a learning-and-search-based framework that (i) drastically
reduces the time for post-design PSC evaluation and (ii) explores the
security-vs-PPA design space. Thus, ASCENT enables an efficient exploration of
a large number of candidate netlists, leading to an improvement in PSC
resilience compared to regular PPA-optimized netlists. ASCENT is up to 120x
faster than traditional PSC analysis and yields a 3.11x improvement for PSC
resilience of state-of-the-art PSC countermeasuresComment: Accepted at 2024 ACM/IEEE International Conference on Computer-Aided
Desig
OpenABC-D: A Large-Scale Dataset For Machine Learning Guided Integrated Circuit Synthesis
Logic synthesis is a challenging and widely-researched combinatorial optimization problem during integrated circuit (IC) design. It transforms a high-level description of hardware in a programming language like Verilog into an optimized digital circuit netlist, a network of interconnected Boolean logic gates,that implements the function. Spurred by the success of ML in solving combinatorial and graph problems in other domains, there is growing interest in the design of ML-guided logic synthesis tools. Yet, there are no standard datasets or prototypical learning tasks defined for this problem domain. Here, we de-scribe OpenABC-D, a large-scale, labeled dataset produced by synthesizing opensource designs with a leading open-source logic synthesis tool and illustrate its use in developing, evaluating and benchmarking ML-guided logic synthesis.OpenABC-D has intermediate and final outputs in the form of 870,000 And-Inverter-Graphs (AIGs) produced from 1500 synthesis runs plus labels such as the node counts, longest path, area, and timing of the AIGs. We define four learning problems on this dataset and benchmark existing solutions for these problems.
The codes related to dataset creation and benchmark models are available at: https://github.com/NYU-MLDA/OpenABC.git.
The dataset generated is available during a review period at this location: https://app.globus.org/file-manager?origin_id=ae7b03ad-9e50-472c-9601-ff99054ae47c&origin_path=%2F.
The data will be published here following the review
ASSURE: RTL Locking Against an Untrusted Foundry
Semiconductor design companies are integrating proprietary intellectual property (IP) blocks to build custom integrated circuits (ICs) and fabricate them in a third-party foundry. Unauthorized IC copies cost these companies billions of dollars annually. While several methods have been proposed for hardware IP obfuscation, they operate on the gate-level netlist, i.e., after the synthesis tools embed most of the semantic information into the netlist. We propose ASSURE to protect hardware IP modules operating on the register-transfer level (RTL) description. The RTL approach has three advantages: 1) it allows designers to obfuscate IP cores generated with many different methods (e.g., hardware generators, high-level synthesis tools, and preexisting IPs); 2) it obfuscates the semantics of an IC before logic synthesis; and 3) it does not require modifications to EDA flows. We perform a cost and security assessment of ASSURE against state-of-the-art oracle-less attacks
