Hardware Trojan Insertion in Finalized Layouts: a Silicon Demonstration

12/06/2021
by   Tiago Perez, et al.
0

Owning a high-end semiconductor foundry is a luxury very few companies can afford. Thus, fabless design companies outsource integrated circuit fabrication to third parties. Within foundries, rogue elements may gain access to the customer's layout and perform malicious acts, including the insertion of a hardware trojan (HT). Many works focus on the structure/effects of a HT, while very few have demonstrated the viability of their HTs in silicon. Even fewer disclose how HTs are inserted or the time required for this activity. Our work details, for the first time, how effortlessly a HT can be inserted into a finalized layout by presenting an insertion framework based on the engineering change order flow. For validation, we have built an ASIC prototype in 65nm CMOS technology comprising of four trojaned cryptocores. A side-channel HT is inserted in each core with the intent of leaking the cryptokey over a power channel. Moreover, we have determined that the entire attack can be mounted in a little over one hour. We also show that the attack was successful for all tested samples. Finally, our measurements demonstrate the robustness of our SCT against skews in the manufacturing process.

READ FULL TEXT

page 7

page 8

page 10

page 11

page 13

research
02/01/2021

Side-Channel Trojan Insertion – a Practical Foundry-Side Attack via ECO

Design companies often outsource their integrated circuit (IC) fabricati...
research
08/19/2022

A Pragmatic Methodology for Blind Hardware Trojan Insertion in Finalized Layouts

A potential vulnerability for integrated circuits (ICs) is the insertion...
research
02/14/2019

Protect Your Chip Design Intellectual Property: An Overview

The increasing cost of integrated circuit (IC) fabrication has driven mo...
research
05/30/2019

iVAMS 1.0: Polynomial-Metamodel-Integrated Intelligent Verilog-AMS for Fast, Accurate Mixed-Signal Design Optimization

Electronic circuit behavioral models built with hardware description/mod...
research
11/15/2022

Security Closure of IC Layouts Against Hardware Trojans

Due to cost benefits, supply chains of integrated circuits (ICs) are lar...
research
08/11/2023

SALSy: Security-Aware Layout Synthesis

Integrated Circuits (ICs) are the target of diverse attacks during their...
research
07/20/2022

EVHA: Explainable Vision System for Hardware Testing and Assurance – An Overview

Due to the ever-growing demands for electronic chips in different sector...

Please sign up or login with your details

Forgot password? Click here to reset