How Secure is Split Manufacturing in Preventing Hardware Trojan?

被引:0
|
作者
Chen, Zhang [1 ]
Zhou, Pingqiang [1 ]
Ho, Tsung-Yi [2 ]
Jin, Yier [3 ]
机构
[1] ShanghaiTech Univ, Sch Informat Sci & Technol, Shanghai, Peoples R China
[2] Natl Tsing Hua Univ, Dept Comp Sci, Hsinchu 30013, Taiwan
[3] Univ Cent Florida, Dept Elect & Comp Engn, Orlando, FL 32816 USA
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
With the trend of outsourcing fabrication, split manufacturing is regarded as a promising way to both provide the high-end nodes in untrusted external foundries and protect the design from potential attackers. However, in this work, we show that split manufacturing is not inherently secure. A hardware trojan attacker can still discover necessary information with a simulated annealing based attack approach at the placement level. We further propose a defense approach by moving the insecure gates away from their easily-attacked candidate locations. Experimental results on benchmark circuits show the effectiveness of our proposed methods.
引用
收藏
页数:6
相关论文
共 50 条
  • [41] Character Reassignment for Hardware Trojan Detection
    Waller, Noah
    Nauman, Hunter
    Taylor, Derek
    Del Carmen, Rafael
    Di, Jia
    2021 IEEE INTERNATIONAL MIDWEST SYMPOSIUM ON CIRCUITS AND SYSTEMS (MWSCAS), 2021, : 861 - 864
  • [42] The Undetectable and Unprovable Hardware Trojan Horse
    Wei, Sheng
    Potkonjak, Miodrag
    2013 50TH ACM / EDAC / IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2013,
  • [43] Formal Verification for Hardware Trojan Detection
    Ponugoti, Kushal Kumar
    ProQuest Dissertations and Theses Global, 2023,
  • [44] Review on Hardware Trojan Detection Techniques
    R. Naveenkumar
    N. M. Sivamangai
    A. Napolean
    S. Sridevi Sathayapriya
    National Academy Science Letters, 2023, 46 : 521 - 524
  • [45] Hardware Trojan and Countermeasures for Internet of Things
    University of Bahrain, College of Information Technology, Sakhir, Bahrain
    Int. Conf. Innov. Intell. Informatics, Comput., Technol., 3ICT, 2022, (233-238):
  • [46] A survey of hardware Trojan threat and defense
    Li, He
    Liu, Qiang
    Zhang, Jiliang
    INTEGRATION-THE VLSI JOURNAL, 2016, 55 : 426 - 437
  • [47] Hardware Trojan Attacks in Embedded Memory
    Hoque, Tamzidul
    Wang, Xinmu
    Basak, Abhishek
    Karam, Robert
    Bhunia, Swamp
    2018 IEEE 36TH VLSI TEST SYMPOSIUM (VTS 2018), 2018,
  • [48] Hardware Trojan Detection Based on SRC
    Sun, Chen
    Cheng, Liye
    Wang, Liwei
    Huang, Yun
    2020 35TH YOUTH ACADEMIC ANNUAL CONFERENCE OF CHINESE ASSOCIATION OF AUTOMATION (YAC), 2020, : 472 - 475
  • [49] Classification of Hardware Trojan Detection Techniques
    Moein, Samer
    Subramnian, Jayaram
    Gulliver, T. Aaron
    Gebali, Fayez
    El-Kharashi, M. Watheq
    2015 TENTH INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING & SYSTEMS (ICCES), 2015, : 357 - 362
  • [50] Trojan Playground: A Reinforcement Learning Framework for Hardware Trojan Insertion and Detection
    Sarihi, Amin
    Patooghy, Ahmad
    Jamieson, Peter
    Badawy, Abdel-Hameed A.
    arXiv, 2023,