How Secure is Split Manufacturing in Preventing Hardware Trojan?

被引:0
|
作者
Chen, Zhang [1 ]
Zhou, Pingqiang [1 ]
Ho, Tsung-Yi [2 ]
Jin, Yier [3 ]
机构
[1] ShanghaiTech Univ, Sch Informat Sci & Technol, Shanghai, Peoples R China
[2] Natl Tsing Hua Univ, Dept Comp Sci, Hsinchu 30013, Taiwan
[3] Univ Cent Florida, Dept Elect & Comp Engn, Orlando, FL 32816 USA
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
With the trend of outsourcing fabrication, split manufacturing is regarded as a promising way to both provide the high-end nodes in untrusted external foundries and protect the design from potential attackers. However, in this work, we show that split manufacturing is not inherently secure. A hardware trojan attacker can still discover necessary information with a simulated annealing based attack approach at the placement level. We further propose a defense approach by moving the insecure gates away from their easily-attacked candidate locations. Experimental results on benchmark circuits show the effectiveness of our proposed methods.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] How Secure Is Split Manufacturing in Preventing Hardware Trojan?
    Yang, Yajun
    Chen, Zhang
    Liu, Yuan
    Ho, Tsung-Yi
    Jin, Yier
    Zhou, Pingqiang
    ACM TRANSACTIONS ON DESIGN AUTOMATION OF ELECTRONIC SYSTEMS, 2020, 25 (02)
  • [2] Hardware trojan attack methods and security analysis under split manufacturing
    Yang Y.
    Chen Z.
    Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2019, 46 (04): : 167 - 175
  • [3] Is Split Manufacturing Secure?
    Rajendran, Jeyavijayan
    Sinanoglu, Ozgur
    Karri, Ramesh
    DESIGN, AUTOMATION & TEST IN EUROPE, 2013, : 1259 - 1264
  • [4] Split and Eliminate: A Region-Based Segmentation for Hardware Trojan Detection
    Tiempo, Ann Jelyn
    Jeong, Yong-Jin
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2023, E106D (03) : 349 - 356
  • [5] BISA: Built-In Self-Authentication for Preventing Hardware Trojan Insertion
    Xiao, Kan
    Tehranipoor, Mohammed
    2013 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE-ORIENTED SECURITY AND TRUST (HOST), 2013, : 45 - 50
  • [6] Mitigation of Hardware Trojan based Denial-of-Service attack for secure NoCs
    Boraten, Travis
    Kodi, Avinash
    JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2018, 111 : 24 - 38
  • [7] How Secure Are Printed Circuit Boards Against Trojan Attacks?
    Ghosh, Swaroop
    Basak, Abhishek
    Bhunia, Swarup
    IEEE DESIGN & TEST, 2015, 32 (02) : 7 - 16
  • [8] Hardware security without secure hardware: How to decrypt with a password and a server
    Blazy, Olivier
    Brouilhet, Laura
    Chevalier, Celine
    Towa, Patrick
    Tucker, Ida
    Vergnaud, Damien
    THEORETICAL COMPUTER SCIENCE, 2021, 895 : 178 - 211
  • [9] Hardware Trojan Horses
    Tehranipoor, Mohammad
    Sunar, Berk
    TOWARDS HARDWARE-INTRINSIC SECURITY: FOUNDATIONS AND PRACTICE, 2010, : 167 - 187
  • [10] Hardware Trojan Detection
    Alluhaib, Ghalia
    Aldissi, Hanan
    Alqarni, Rasha
    Banafee, Shoroq
    Nagro, Wafaa
    Aljandali, Asia
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2020, 20 (03): : 141 - 147