Hardware trojan attack methods and security analysis under split manufacturing

被引:0
|
作者
Yang Y. [1 ,2 ,3 ]
Chen Z. [1 ]
机构
[1] School of Information Science & Technology, ShanghaiTech Univ., Shanghai
[2] Shanghai Institute of Microsystem & Information Technology, Chinese Academy of Sciences, Shanghai
[3] School of Electronic, Electrical and Communication Engineering, University of Chinese Academy of Sciences, Beijing
关键词
Attack; Genetic algorithm; Hardware security; Hardware Trojan; Split manufacturing;
D O I
10.19665/j.issn1001-2400.2019.04.023
中图分类号
学科分类号
摘要
The Hardware Trojan (HT) threats the security of chips greatly, and in order to explore the effectiveness of split manufacturing (SM) securing circuits from HT insertion, an HT threat model is first proposed under SM. Then we propose two possible attack methods: one is the improved proximity-based attack and the other is the genetic algorithm based attack, which leverage different physical heuristics revealed from the physical design process. Experimental results show that both the proposed methods are effective on inserting HTs under SM. Especially the genetic algorithm based attack method is shown to be the most effective with the attack accuracy of up to 78.62%, thus demonstrating that SM is not secure inherently and that more efforts need to be made in order to make SM more secure. © 2019, The Editorial Board of Journal of Xidian University. All right reserved.
引用
收藏
页码:167 / 175
页数:8
相关论文
共 18 条
  • [1] Chen S.Y., Vemuri R., Reverse Engineering of Split Manufactured Sequential Circuits Using Satisfiability Checking, Proceedings of the 201836th IEEE International Conference on Computer Design, pp. 530-536, (2019)
  • [2] Wang K., Chen H., Guan X., Et al., Research on Hardware Trojan Defense, Chinese Journal of Network and Information Security, 3, 9, pp. 5-16, (2017)
  • [3] Qin M., Mu D., Hu W., Et al., Fine-granularity Gate Level Formal Verification Method for Hardware Security, Journal of Xidian University, 45, 5, pp. 143-148, (2018)
  • [4] Mao B., Mu D., Hu W., Et al., Quantitative Analysis of Sliding Window Attack for the RSA Timing Channel, Journal of Xidian University, 44, 5, pp. 114-120, (2017)
  • [5] He J., Zhao Y., Guo X., Et al., Hardware Trojan Detection through Chip-free Electromagnetic Side-channel Statistical Analysis, IEEE Transactions on Very Large Scale Integration Systems, 25, 10, pp. 2939-2948, (2017)
  • [6] Jarvi R.W., McLntyre M.G., Split Manufacturing Method for Advanced Semiconductor Circuits, (2004)
  • [7] Jagasivamani M., Gadfort P., Sika M., Et al., Split Fabrication Obfuscation: Metrics and Techniques, Proceedings of the 2014 IEEE International Symposium on Hardware-Oriented Security and Trust, pp. 7-12, (2014)
  • [8] Imeson F., Emtenan A., Garg S., Et al., Securing Computer Hardware Using 3D Integrated Circuit(IC) Technology and Split Manufacturing for Obfuscation, Proceedings of the 2013 USENIX Conference on Security, pp. 495-510, (2013)
  • [9] Xu Q., Jiang X., Yao L., Et al., Overview of the Detection and Prevention Study of Hardware Trojans, Chinese Journal of Network and Information Security, 3, 4, pp. 5-17, (2017)
  • [10] Vaidyanathan K., Das B.P., Sumbul E., Et al., Building Trusted ICs Using Split Fabrication, Proceedings of the 2014 IEEE International Symposium on Hardware-Oriented Security and Trust, pp. 1-6, (2014)