Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
139 tokens/sec
GPT-4o
7 tokens/sec
Gemini 2.5 Pro Pro
46 tokens/sec
o3 Pro
4 tokens/sec
GPT-4.1 Pro
38 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

TroLLoc: Logic Locking and Layout Hardening for IC Security Closure against Hardware Trojans (2405.05590v1)

Published 9 May 2024 in cs.CR, cs.AR, and cs.LG

Abstract: Due to cost benefits, supply chains of integrated circuits (ICs) are largely outsourced nowadays. However, passing ICs through various third-party providers gives rise to many security threats, like piracy of IC intellectual property or insertion of hardware Trojans, i.e., malicious circuit modifications. In this work, we proactively and systematically protect the physical layouts of ICs against post-design insertion of Trojans. Toward that end, we propose TroLLoc, a novel scheme for IC security closure that employs, for the first time, logic locking and layout hardening in unison. TroLLoc is fully integrated into a commercial-grade design flow, and TroLLoc is shown to be effective, efficient, and robust. Our work provides in-depth layout and security analysis considering the challenging benchmarks of the ISPD'22/23 contests for security closure. We show that TroLLoc successfully renders layouts resilient, with reasonable overheads, against (i) general prospects for Trojan insertion as in the ISPD'22 contest, (ii) actual Trojan insertion as in the ISPD'23 contest, and (iii) potential second-order attacks where adversaries would first (i.e., before Trojan insertion) try to bypass the locking defense, e.g., using advanced machine learning attacks. Finally, we release all our artifacts for independent verification [2].

Definition Search Book Streamline Icon: https://streamlinehq.com
References (73)
  1. F. Wang et al., “Security closure of IC layouts against hardware Trojans,” in Proc. ISPD, 2023.
  2. ——, “Baseline and protected layouts,” 2024, https://drive.google.com/file/d/17ysAYnoPgFuy0Yj969dTGUWZVrIT7PmW/view?usp=sharing.
  3. M. Rostami et al., “A primer on hardware security: Models, methods, and metrics,” Proc. IEEE, vol. 102, no. 8, 2014.
  4. W. Hu et al., “An overview of hardware security and trust: Threats, countermeasures and design tools,” TCAD, 2020.
  5. J. Knechtel, “Hardware security for and beyond CMOS technology,” in Proc. ISPD, 2021.
  6. J. Knechtel et al., “Towards secure composition of integrated circuits and electronic systems: On the role of EDA,” in Proc. DATE, 2020.
  7. G. Sigl, “Keynote address: Design of secure systems – where are the eda tools?” in Proc. ICCAD, 2011.
  8. P. Ravi et al., “Security is an architectural design constraint,” Microprocess. Microsyst., vol. 68, no. C, 2019.
  9. J. Knechtel et al., “Benchmarking security closure of physical layouts: Ispd 2022 contest,” in Proc. ISPD, 2022.
  10. ——, “Security closure of physical layouts,” in Proc. ICCAD, 2021.
  11. M. Eslami et al., “Benchmarking advanced security closure of physical layouts: Ispd 2023 contest,” 2023, https://wp.nyu.edu/ispd23_contest/.
  12. K. Xiao et al., “Hardware trojans: Lessons learned after one decade of research,” TODAES, vol. 22, no. 1, 2016.
  13. C. Dong et al., “Hardware trojans in chips: A survey for detection and prevention,” Sensors, vol. 20, no. 18, 2020.
  14. K. Yang et al., “A2: Analog malicious hardware,” in Proc. SP, 2016.
  15. L. Alrahis et al., “Muxlink: Circumventing learning-resilient mux-locking using graph neural network-based link prediction,” in Proc. DATE, 2022.
  16. ——, “Omla: An oracle-less machine learning-based attack on logic locking,” TCS, vol. 69, no. 3, 2022.
  17. F. Almeida et al., “Resynthesis-based attacks against logic locking,” in Proc. ISQED, 2023.
  18. A. Alaql et al., “Scope: Synthesis-based constant propagation attack on logic locking,” Trans. VLSI, vol. 29, no. 8, 2021.
  19. T. Perez and S. Pagliarini, “Hardware Trojan insertion in finalized layouts: From methodology to a silicon demonstration,” TCAD, 2022.
  20. S. Adee, “The hunt for the kill switch,” Spectrum, vol. 45, no. 5, 2008.
  21. S. Skorobogatov and C. Woods, “Breakthrough silicon scanning discovers backdoor in military chip,” in Proc. TCHES, 2012.
  22. M. Muehlberghuber et al., “Red team vs. blue team hardware Trojan analysis: Detection of a hardware Trojan on an actual ASIC,” in Proc. Int. Workshop Hardw. Arch. Supp. Sec. Priv., 2013.
  23. S. Ghandali et al., “Side-channel hardware Trojan for provably-secure SCA-protected implementations,” Trans. VLSI, vol. 28, no. 6, pp. 1435–1448, 2020.
  24. E. Puschner et al., “Red team vs. blue team: A real-world hardware Trojan detection case study across four modern CMOS technology generations,” in Proc. SP, 2023.
  25. T. Trippel et al., “Icas: an extensible framework for estimating the susceptibility of ic layouts to additive trojans,” in Proc. SP, 2020.
  26. H. Salmani et al., “Vulnerability analysis of a circuit layout to hardware trojan insertion,” Trans. Inf. Forens. Sec., vol. 11, no. 6, 2016.
  27. A. Hepp et al., “A pragmatic methodology for blind hardware Trojan insertion in finalized layouts,” in Proc. ICCAD, 2022.
  28. X. Wei et al., “Rethinking ic layout vulnerability: Simulation-based hardware trojan threat assessment with high fidelity,” in Proc. SP, 2024.
  29. S. Dupuis et al., “A novel hardware logic encryption technique for thwarting illegal overproduction and hardware trojans,” in Proc. IOLTS.
  30. A. Marcelli et al., “An evolutionary approach to hardware encryption and trojan-horse mitigation,” in Proc. DATE, 2017.
  31. M. S. Samimi et al., “Hardware enlightening: No where to hide your hardware trojans!” in Proc. IOLTS, 2016.
  32. D. Šišejković et al., “Control-lock: Securing processor cores against software-controlled hardware trojans,” in Proc. GLSVLSI, 2019.
  33. K. Xiao et al., “A novel built-in self-authentication technique to prevent inserting hardware trojans,” TCAD, vol. 33, no. 12, 2014.
  34. P.-S. Ba et al., “Hardware trojan prevention using layout-level design approach,” in Proc. Europ, Conf. Circ. Theory Des., 2015.
  35. ——, “Hardware trust through layout filling: A hardware trojan prevention technique,” in Proc. ISVLSI, 2016.
  36. H. Hossein-Talaee and A. Jahanian, “Layout vulnerability reduction against trojan insertion using security-aware white space distribution,” in Proc. ISVLSI, 2017.
  37. F. Imeson et al., “Securing computer hardware using 3D integrated circuit (IC) technology and split manufacturing for obfuscation,” in Proc. USENIX Sec. Symp., 2013.
  38. Q. Shi et al., “Obfuscated built-in self-authentication with secure and efficient wire-lifting,” TCAD, vol. 38, no. 11, 2018.
  39. T. Trippel et al., “T-TER: Defeating A2 Trojans with targeted tamper-evident routing,” in Proc. CCS, 2023.
  40. G. Guo et al., “ASSURER: A PPA-friendly security closure framework for physical design,” in Proc. ASP-DAC, 2023.
  41. J.-W. Hsu et al., “Security-aware physical design against Trojan insertion, frontside probing, and fault injection attacks,” in Proc. ISPD, 2023.
  42. M. Eslami et al., “SALSy: Security-aware layout synthesis,” 2023.
  43. X. Wei et al., “Gdsii-guard: Eco anti-trojan optimization with exploratory timing-security trade-offs,” in Proc. DAC, 2023.
  44. M. Eslami et al., “SCARF: Securing chips with a robust framework against fabrication-time hardware trojans,” 2024.
  45. L. A. Guimarães et al., “Detection of layout-level trojans by monitoring substrate with preexisting built-in sensors,” in Proc. ISVLSI, 2017.
  46. Y. Hou et al., “R2d2: Runtime reassurance and detection of a2 trojan,” in Proc. HOST, 2018.
  47. A. Vijayan et al., “Runtime identification of hardware trojans by feature analysis on gate-level unstructured data and anomaly detection,” TODAES, vol. 25, no. 4, 2020.
  48. L. W. Kim and J. D. Villasenor, “A system-on-chip bus architecture for thwarting integrated circuit trojan horses,” Trans. VLSI, 2011.
  49. A. Basak et al., “Security assurance for system-on-chip designs with untrusted IPs,” Trans. Inf. Forens. Sec., vol. 12, no. 7, 2017.
  50. T. F. Wu et al., “TPAD: Hardware trojan prevention and detection for trusted integrated circuits,” TCAD, vol. 35, no. 4, 2016.
  51. R. S. Wahby et al., “Verifiable ASICs,” Proc. SP, 2016.
  52. D. Agrawal et al., “Trojan detection using IC fingerprinting,” in Proc. SP, 2007.
  53. X. Guo et al., “QIF-Verilog: Quantitative information-flow based hardware description languages for pre-silicon security assessment,” in Proc. HOST, 2019.
  54. N. Fern et al., “Detecting hardware trojans in unspecified functionality through solving satisfiability problems,” in Proc. ASP-DAC, 2017.
  55. X. Chen et al., “Hardware trojan detection in third-party digital intellectual property cores by multilevel feature analysis,” TCAD, 2018.
  56. H. Lashen et al., “TrojanSAINT: Gate-level netlist sampling-based inductive learning for hardware Trojan detection,” in Proc. ISCAS, 2023.
  57. S. Narasimhan et al., “Hardware trojan detection by multiple-parameter side-channel analysis,” Trans. Comp., vol. 62, no. 11, 2013.
  58. D. Deng et al., “Novel design strategy toward a2 trojan detection based on built-in acceleration structure,” TCAD, vol. 39, no. 12, 2020.
  59. T. Sugawara et al., “Reversing stealthy dopant-level circuits,” J. Cryptogr. Eng., vol. 5, no. 2, 2015.
  60. N. Vashistha et al., “Trojan scanner: Detecting hardware trojans with rapid SEM imaging combined with image processing and machine learning,” in ISTFA, 2018.
  61. V. Gohil et al., “ATTRITION: Attacking static hardware Trojan detection techniques using reinforcement learning,” in Proc. CCS, 2022.
  62. K. Hasegawa et al., “Trojan-feature extraction at gate-level netlists and its application to hardware-Trojan detection using random forest classifier,” in Proc. ISCAS, 2017.
  63. N. Jacob et al., “Hardware Trojans: Current challenges and approaches,” Comp. & Dig. Techs., vol. 8, no. 6, 2014.
  64. K. Baek et al., “Pin accessibility and routing congestion aware DRC hotspot prediction using graph neural network and u-net,” in Proc. ICCAD, 2022.
  65. J. A. Roy et al., “Ending piracy of integrated circuits,” Computer, vol. 43, no. 10, 2010.
  66. H. Mardani Kamali et al., “Lut-lock: A novel lut-based logic obfuscation for fpga-bitstream and asic-hardware protection,” in Proc. ISVLSI, 2018.
  67. J. Rajendran et al., “Fault analysis-based logic encryption,” Trans. Comp., vol. 64, no. 2, 2015.
  68. M. Yasin et al., “Activation of logic encrypted chips: Pre-test or post-test?” in Proc. DATE, 2016.
  69. P. Subramanyan et al., “Evaluating the security of logic encryption algorithms,” in Proc. HOST, 2015.
  70. P. Chakraborty et al., “Sail: Machine learning guided structural analysis attack on hardware obfuscation,” in Proc. AHOST, 2018.
  71. “NanGate FreePDK45 Open Cell Library,” Nangate Inc, 2011, http://www.nangate.com/?page_id=2325.
  72. J. Knechtel, “Resynthesis + SCOPE Setup,” 2023, https://github.com/DfX-NYUAD/resynthesis_attack.
  73. D. Šišejković et al., “Deceptive logic locking for hardware integrity protection against machine learning attacks,” TCAD, vol. 41, no. 6, 2022.
Citations (2)

Summary

We haven't generated a summary for this paper yet.