How Secure is Split Manufacturing in Preventing Hardware Trojan?

被引:0
|
作者
Chen, Zhang [1 ]
Zhou, Pingqiang [1 ]
Ho, Tsung-Yi [2 ]
Jin, Yier [3 ]
机构
[1] ShanghaiTech Univ, Sch Informat Sci & Technol, Shanghai, Peoples R China
[2] Natl Tsing Hua Univ, Dept Comp Sci, Hsinchu 30013, Taiwan
[3] Univ Cent Florida, Dept Elect & Comp Engn, Orlando, FL 32816 USA
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
With the trend of outsourcing fabrication, split manufacturing is regarded as a promising way to both provide the high-end nodes in untrusted external foundries and protect the design from potential attackers. However, in this work, we show that split manufacturing is not inherently secure. A hardware trojan attacker can still discover necessary information with a simulated annealing based attack approach at the placement level. We further propose a defense approach by moving the insecure gates away from their easily-attacked candidate locations. Experimental results on benchmark circuits show the effectiveness of our proposed methods.
引用
收藏
页数:6
相关论文
共 50 条
  • [21] Towards hardware Trojan: Problem analysis and Trojan simulation
    Department of Computer Science and Technology, Zhengzhou Institute of Information Science and Technology, Zhengzhou, China
    Int. Conf. Inf. Eng. Comput. Sci. - Proc., ICIECS,
  • [22] Secure Systolic Montgomery Modular Multiplier Resilient to Hardware Trojan and Fault-Injection Attacks
    Yang, Qi
    Qin, Zhongping
    2013 INTERNATIONAL CONFERENCE ON COMPUTER, INFORMATION AND TELECOMMUNICATION SYSTEMS (CITS), 2013,
  • [23] Hardware Trojan for Security LSI
    Yoshikawa, M.
    Satoh, R.
    Kumaki, T.
    2013 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS (ICCE), 2013, : 29 - +
  • [24] Advances in Hardware Trojan Detection
    Vaidya, Jaideep
    COMPUTER, 2019, 52 (06) : 4 - 5
  • [25] Hardware Trojan for security LSI
    Yoshikawa, M.
    Satoh, R.
    Kumaki, T.
    Digest of Technical Papers - IEEE International Conference on Consumer Electronics, 2013, : 29 - 30
  • [26] Hardware Trojan with Frequency Modulation
    Luft, Ash
    Sima, Mihai
    Mcguire, Michael
    2021 IEEE 12TH LATIN AMERICA SYMPOSIUM ON CIRCUITS AND SYSTEM (LASCAS), 2021,
  • [27] Scalable Hardware Trojan Diagnosis
    Wei, Sheng
    Potkonjak, Miodrag
    IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 2012, 20 (06) : 1049 - 1057
  • [28] A hardware obfuscation technique for manufacturing a secure 3D IC
    Madani, Siroos
    Madani, Mohammad R.
    Dutta, Indira Kalyan
    Joshi, Yamini
    Bayoumi, Magdy
    2018 IEEE 61ST INTERNATIONAL MIDWEST SYMPOSIUM ON CIRCUITS AND SYSTEMS (MWSCAS), 2018, : 318 - 323
  • [29] Secure Split-Test for Preventing IC Piracy by Untrusted Foundry and Assembly
    Contreras, Gustavo K.
    Rahman, Md Tauhidur
    Tehranipoor, Mohammad
    PROCEEDINGS OF THE 2013 IEEE INTERNATIONAL SYMPOSIUM ON DEFECT AND FAULT TOLERANCE IN VLSI AND NANOTECHNOLOGY SYSTEMS (DFTS), 2013, : 196 - 203
  • [30] A Practical Split Manufacturing Framework for Trojan Prevention via Simultaneous Wire Lifting and Cell Insertion
    Li, Meng
    Yu, Bei
    Lin, Yibo
    Xu, Xiaoqing
    Li, Wuxi
    Pan, David Z.
    2018 23RD ASIA AND SOUTH PACIFIC DESIGN AUTOMATION CONFERENCE (ASP-DAC), 2018, : 265 - 270