How Secure is Split Manufacturing in Preventing Hardware Trojan?

被引:0
|
作者
Chen, Zhang [1 ]
Zhou, Pingqiang [1 ]
Ho, Tsung-Yi [2 ]
Jin, Yier [3 ]
机构
[1] ShanghaiTech Univ, Sch Informat Sci & Technol, Shanghai, Peoples R China
[2] Natl Tsing Hua Univ, Dept Comp Sci, Hsinchu 30013, Taiwan
[3] Univ Cent Florida, Dept Elect & Comp Engn, Orlando, FL 32816 USA
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
With the trend of outsourcing fabrication, split manufacturing is regarded as a promising way to both provide the high-end nodes in untrusted external foundries and protect the design from potential attackers. However, in this work, we show that split manufacturing is not inherently secure. A hardware trojan attacker can still discover necessary information with a simulated annealing based attack approach at the placement level. We further propose a defense approach by moving the insecure gates away from their easily-attacked candidate locations. Experimental results on benchmark circuits show the effectiveness of our proposed methods.
引用
收藏
页数:6
相关论文
共 50 条
  • [31] A Practical Split Manufacturing Framework for Trojan Prevention via Simultaneous Wire Lifting and Cell Insertion
    Li, Meng
    Yu, Bei
    Lin, Yibo
    Xu, Xiaoqing
    Li, Wuxi
    Pan, David Z.
    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2019, 38 (09) : 1585 - 1598
  • [32] How Logic Masking Can Improve Path Delay Analysis for Hardware Trojan Detection
    Nejat, Arash
    Hely, David
    Beroulle, Vincent
    PROCEEDINGS OF THE 34TH IEEE INTERNATIONAL CONFERENCE ON COMPUTER DESIGN (ICCD), 2016, : 424 - 427
  • [33] How to secure your company's manufacturing data
    Singer, BL
    BIOPHARM INTERNATIONAL, 2005, 18 (12) : 48 - +
  • [34] Survey of Hardware Trojan Threats and Detection
    Hayashi, Yuichi
    Kawamura, Shinichi
    PROCEEDINGS OF THE 2020 INTERNATIONAL SYMPOSIUM ON ELECTROMAGNETIC COMPATIBILITY (EMC EUROPE), 2020,
  • [35] Hardware Trojan in FPGA CNN Accelerator
    Ye, Jing
    Hu, Yu
    Li, Xiaowei
    2018 IEEE 27TH ASIAN TEST SYMPOSIUM (ATS), 2018, : 68 - 73
  • [36] Hardware Trojan: Threats and Emerging Solutions
    Chakraborty, Rajat Subhra
    Narasimhan, Seetharam
    Bhunia, Swarup
    2009 IEEE INTERNATIONAL HIGH LEVEL DESIGN VALIDATION AND TEST WORKSHOP, 2009, : 166 - 171
  • [37] In-situ Trojan Authentication for Invalidating Hardware-Trojan Functions
    Oya, Masaru
    Shi, Youhua
    Yanagisawa, Masao
    Togawa, Nozomu
    PROCEEDINGS OF THE SEVENTEENTH INTERNATIONAL SYMPOSIUM ON QUALITY ELECTRONIC DESIGN ISQED 2016, 2016, : 152 - 157
  • [38] Hardware Trojan Threat and Its Countermeasures
    Xuan-Thuy Ngo
    Van-Phuc Hoang
    Han Le Duc
    PROCEEDINGS OF 2018 5TH NAFOSTED CONFERENCE ON INFORMATION AND COMPUTER SCIENCE (NICS 2018), 2018, : 35 - 40
  • [39] Survey: Hardware Trojan Detection for Netlist
    Yang, Yipei
    Ye, Jing
    Cao, Yuan
    Zhang, Jiliang
    Li, Xiaowei
    Li, Huawei
    Hu, Yu
    2020 IEEE 29TH ASIAN TEST SYMPOSIUM (ATS), 2020, : 48 - 53
  • [40] Hardware Trojan Self-Detector
    Kiran, N. Ravi
    Ritesh, M.
    Harish, G.
    Yellampalli, Siva
    2015 INTERNATIONAL CONFERENCE ON SMART TECHNOLOGIES AND MANAGEMENT FOR COMPUTING, COMMUNICATION, CONTROLS, ENERGY AND MATERIALS (ICSTM), 2015, : 428 - 433