A Pragmatic Methodology for Blind Hardware Trojan Insertion in Finalized Layouts

08/19/2022
by   Alexander Hepp, et al.
0

A potential vulnerability for integrated circuits (ICs) is the insertion of hardware trojans (HTs) during manufacturing. Understanding the practicability of such an attack can lead to appropriate measures for mitigating it. In this paper, we demonstrate a pragmatic framework for analyzing HT susceptibility of finalized layouts. Our framework is representative of a fabrication-time attack, where the adversary is assumed to have access only to a layout representation of the circuit. The framework inserts trojans into tapeout-ready layouts utilizing an Engineering Change Order (ECO) flow. The attacked security nodes are blindly searched utilizing reverse-engineering techniques. For our experimental investigation, we utilized three crypto-cores (AES-128, SHA-256, and RSA) and a microcontroller (RISC-V) as targets. We explored 96 combinations of triggers, payloads and targets for our framework. Our findings demonstrate that even in high-density designs, the covert insertion of sophisticated trojans is possible. All this while maintaining the original target logic, with minimal impact on power and performance. Furthermore, from our exploration, we conclude that it is too naive to only utilize placement resources as a metric for HT vulnerability. This work highlights that the HT insertion success is a complex function of the placement, routing resources, the position of the attacked nodes, and further design-specific characteristics. As a result, our framework goes beyond just an attack, we present the most advanced analysis tool to assess the vulnerability of HT insertion into finalized layouts.

READ FULL TEXT
research
07/21/2022

High-Level Approaches to Hardware Security: A Tutorial

Designers use third-party intellectual property (IP) cores and outsource...
research
12/06/2021

Hardware Trojan Insertion in Finalized Layouts: a Silicon Demonstration

Owning a high-end semiconductor foundry is a luxury very few companies c...
research
02/01/2021

Side-Channel Trojan Insertion – a Practical Foundry-Side Attack via ECO

Design companies often outsource their integrated circuit (IC) fabricati...
research
08/18/2022

Reverse Engineering of Integrated Circuits: Tools and Techniques

Consumer and defense systems demanded design and manufacturing of electr...
research
10/28/2017

Reverse Engineering Camouflaged Sequential Integrated Circuits Without Scan Access

Integrated circuit (IC) camouflaging is a promising technique to protect...
research
12/28/2019

How Secure Is Your IoT Network?

The proliferation of IoT devices in smart homes, hospitals, and enterpri...

Please sign up or login with your details

Forgot password? Click here to reset