首页> 外文会议>Asia and South Pacific Design Automation Conference >To Detect, Locate, and Mask Hardware Trojans in digital circuits by reverse engineering and functional ECO
【24h】

To Detect, Locate, and Mask Hardware Trojans in digital circuits by reverse engineering and functional ECO

机译:通过逆向工程和功能性ECO检测,定位和掩盖数字电路中的硬件木马

获取原文

摘要

During the EDA process, a design may be tampered directly by dishonest engineers (or “industry spy”), or may be tampered indirectly through the use of malicious modules from a third party Intellectual Property (3PIP) block vendor. During integration and fabrication, the chips may also be tampered by untrusted system integrator or even foundry. Particularly for high-end commercial or classified military chips, Hardware Trojan (HT) Detect-Locate-and-Mask (DL&M) is crucially necessary so as to make sure a design is produced exactly as the original specification (golden). Our objectives are (1) to detect any functionality difference which might be caused by bugs or HTs, (2) to locate/output the difference circuitry to correct the bugs or to investigate the tampering intention or purpose, and (3) to “kill” (mask) the HTs by restoring the chip's functionality back to golden with a minimum circuitry change. Besides blocking the plotted damage in an early stage and pointing the spy source by revealing the HT intention, the masking circuit revision must also be minimized to avoid affecting the chip performance (timing) too much. In this paper, we propose a scheme that integrates reverse engineering, formal verification, functional ECO, and logic rewiring to detect, locate and mask Hardware Trojans with minimized cost. This formal verification based scheme can guarantee catching 100% of the hidden combinational circuit HTs and can handle multiple HTs (no number limit) automatically in one run. Some techniques within our scheme won the first places of the CAD Contests at ICCAD 2012, 2013, and 2014 [1-3].
机译:在EDA过程中,不诚实的工程师(或“行业间谍”)可能会直接对设计进行篡改,或者可能会使用第三方知识产权(3PIP)大卖主的恶意模块对设计进行间接篡改。在集成和制造过程中,芯片也可能会受到不受信任的系统集成商甚至代工厂的篡改。特别是对于高端商业或机密军事芯片,至关重要的是必须使用硬件木马(HT)检测定位和掩码(DL&M),以确保设计完全符合原始规格(黄金)。我们的目标是(1)检测可能由错误或HT引起的任何功能差异;(2)定位/输出差异电路以纠正错误或调查篡改意图或目的;​​以及(3)消除”(掩盖)HT,只需最少的电路更改即可将芯片的功能恢复到最佳状态。除了在早期阶段阻止绘制的损坏并通过揭示HT意图来指出间谍源外,还必须最小化掩蔽电路版本,以避免过多地影响芯片性能(时序)。在本文中,我们提出了一种方案,该方案集成了逆向工程,形式验证,功能ECO和逻辑重新布线,以最小的成本来检测,定位和掩盖硬件木马。这种基于形式验证的方案可以确保捕获100%的隐藏组合电路HT,并且可以在一次运行中自动处理多个HT(无数量限制)。我们方案中的某些技术在ICCAD 2012、2013和2014年[1-3]上赢得了CAD竞赛的第一名。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号