首页> 外文期刊>Science of Computer Programming >Using gate-level side channel parameters for formally analyzing vulnerabilities in integrated circuits
【24h】

Using gate-level side channel parameters for formally analyzing vulnerabilities in integrated circuits

机译:使用门级侧通道参数来形式化分析集成电路中的漏洞

获取原文
获取原文并翻译 | 示例

摘要

The rising trend of globalization in integrated circuits (ICs) design and fabrication process has increased their vulnerability against malicious intrusions and alterations. Such modifications, also referred as Hardware Trojans (HTs), can lead to highly detrimental consequences like causing an IC to subvert normal operation, leak sensitive information or inducing denial of service (DoS). The vulnerability analysis of ICs against the malicious intrusions with conventional design-time testing and exhaustive simulations is computationally intensive, and it takes substantial resources and time for all-encompassing verification. To overcome these limitations, we propose a formal framework, based on gate-level side channel parameters, for a-priori assessment of IC vulnerability against HTs at the early stages of the design. This work employs formal modeling of the IC behavior in terms of switching power, propagation delay and leakage in order to examine the impact of malicious intrusions. We used the bounded model checker nuXmv, to formally verify and analyze the identified properties, owing to its inherent ability to handle real numbers and its support for analyzing infinite state domains. The vulnerabilities of ICs against HTs, and their effects on the IC nodes are assessed by analyzing linear temporal logic (LTL) properties, which are subsequently rendered into behavioral traces. We demonstrate the effectiveness of our approach on a set of ISCAS benchmarks. (C) 2018 Elsevier B.V. All rights reserved.
机译:集成电路(IC)设计和制造过程的全球化趋势不断提高,使其更容易受到恶意入侵和篡改。此类修改也称为硬件木马(HT),可能导致严重的后果,例如导致IC破坏正常运行,泄漏敏感信息或导致拒绝服务(DoS)。使用常规的设计时测试和详尽的模拟对IC进行的针对恶意入侵的漏洞分析需要大量计算,并且要花费大量的资源和时间进行全面的验证。为了克服这些限制,我们提出了一个基于门级侧通道参数的正式框架,用于在设计的早期阶段评估IC对HT的脆弱性。这项工作采用了关于开关行为,传播延迟和泄漏方面的IC行为的形式化模型,以检查恶意入侵的影响。我们使用有界模型检查器nuXmv来正式验证和分析所识别的属性,这是由于其固有的处理实数的能力以及对无限状态域的支持。通过分析线性时序逻辑(LTL)属性,可以评估IC对HT的脆弱性及其对IC节点的影响,然后将这些线性时间逻辑(LTL)属性呈现为行为痕迹。我们在一组ISCAS基准上证明了我们方法的有效性。 (C)2018 Elsevier B.V.保留所有权利。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号