Security Closure of IC Layouts Against Hardware Trojans

被引:2
|
作者
Wang, Fangzhou [1 ]
Wang, Qijing [1 ]
Fu, Bangqi [1 ]
Jiang, Shui [1 ]
Zhang, Xiaopeng [1 ]
Alrahis, Lilas [2 ]
Sinanoglu, Ozgur [2 ]
Knechtel, Johann [2 ]
Ho, Tsung-Yi [1 ]
Young, Evangeline F. Y. [1 ]
机构
[1] Chinese Univ Hong Kong, Hong Kong, Peoples R China
[2] New York Univ, Abu Dhabi, U Arab Emirates
关键词
Hardware Trojans; physical design; security closure; logic locking; ISPD'22 contest; ENCRYPTION; LOCKING; ATTACK;
D O I
10.1145/3569052.3571878
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Due to cost benefits, supply chains of integrated circuits (ICs) are largely outsourced nowadays. However, passing ICs through various third-party providers gives rise to many threats, like piracy of IC intellectual property or insertion of hardware Trojans, i.e., malicious circuit modifications. In this work, we proactively and systematically harden the physical layouts of ICs against post-design insertion of Trojans. Toward that end, we propose a multiplexer-based logic-locking scheme that is (i) devised for layout-level Trojan prevention, (ii) resilient against state-of-the-art, oracle-less machine learning attacks, and (iii) fully integrated into a tailored, yet generic, commercial-grade design flow. Our work provides in-depth security and layout analysis on a challenging benchmark suite. We show that ours can render layouts resilient, with reasonable overheads, against Trojan insertion in general and also against second-order attacks (i.e., adversaries seeking to bypass the locking defense in an oracle-less setting). We release our layout artifacts for independent verification [29].
引用
收藏
页码:229 / 237
页数:9
相关论文
共 50 条
  • [1] Hardware Vulnerabilities and Their Effects on CE Devices: Design for Security Against Trojans
    Sengupta, Anirban
    [J]. IEEE CONSUMER ELECTRONICS MAGAZINE, 2017, 6 (03) : 126 - 133
  • [2] Hardware Trojans and Smart Manufacturing - A Hardware Security Perspective
    Aslam, Sohaib
    Samie, Mohammad
    Jennions, Ian K.
    [J]. ADVANCES IN MANUFACTURING TECHNOLOGY XXXII, 2018, 8 : 305 - 310
  • [3] Hardware Security in IoT Devices with Emphasis on Hardware Trojans
    Sidhu, Simranjeet
    Mohd, Bassam J.
    Hayajneh, Thaier
    [J]. JOURNAL OF SENSOR AND ACTUATOR NETWORKS, 2019, 8 (03)
  • [4] ICAS: an Extensible Framework for Estimating the Susceptibility of IC Layouts to Additive Trojans
    Trippel, Timothy
    Shin, Kang G.
    Bush, Kevin B.
    Hicks, Matthew
    [J]. 2020 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2020), 2020, : 1742 - 1759
  • [5] ICAS: An extensible framework for estimating the susceptibility of IC layouts to additive trojans
    Trippel, Timothy
    Shin, Kang G.
    Bush, Kevin B.
    Hicks, Matthew
    [J]. Proceedings - IEEE Symposium on Security and Privacy, 2020, 2020-May : 1742 - 1759
  • [6] Benchmarking Security Closure of Physical Layouts
    Knechtel, Johann
    Gopinath, Jayanth
    Ashraf, Mohammed
    Bhandari, Jitendra
    Sinanoglu, Ozgur
    Karri, Ramesh
    [J]. ISPD'22: PROCEEDINGS OF THE 2022 INTERNATIONAL SYMPOSIUM ON PHYSICAL DESIGN, 2022, : 221 - 228
  • [7] Hardware Assurance: Trojans, Counterfeits, and Security in an Interconnected World
    Casto, Matthew
    [J]. PROCEEDINGS OF THE 2018 GREAT LAKES SYMPOSIUM ON VLSI (GLSVLSI'18), 2018, : 5 - 5
  • [8] Using Approximate Circuits Against Hardware Trojans
    Martin, Honorio
    Dupuis, Sophie
    Di Natale, Giorgio
    Entrena, Luis
    [J]. IEEE DESIGN & TEST, 2023, 40 (03) : 8 - 16
  • [9] A Novel Method Against Hardware Trojans in Approximate Circuits
    Dou, Yuqin
    Gu, Chongyan
    Wang, Chenghua
    Liu, Weiqing
    [J]. 2023 24TH INTERNATIONAL SYMPOSIUM ON QUALITY ELECTRONIC DESIGN, ISQED, 2023, : 632 - 637
  • [10] Hardware Trojans and Other Threats against Embedded Systems
    Paar, Christof
    [J]. PROCEEDINGS OF THE 2017 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIA CCS'17), 2017, : 1 - 1