Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
110 tokens/sec
GPT-4o
56 tokens/sec
Gemini 2.5 Pro Pro
44 tokens/sec
o3 Pro
6 tokens/sec
GPT-4.1 Pro
47 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

Security Closure of IC Layouts Against Hardware Trojans (2211.07997v1)

Published 15 Nov 2022 in cs.CR, cs.AR, and cs.LG

Abstract: Due to cost benefits, supply chains of integrated circuits (ICs) are largely outsourced nowadays. However, passing ICs through various third-party providers gives rise to many threats, like piracy of IC intellectual property or insertion of hardware Trojans, i.e., malicious circuit modifications. In this work, we proactively and systematically harden the physical layouts of ICs against post-design insertion of Trojans. Toward that end, we propose a multiplexer-based logic-locking scheme that is (i) devised for layout-level Trojan prevention, (ii) resilient against state-of-the-art, oracle-less machine learning attacks, and (iii) fully integrated into a tailored, yet generic, commercial-grade design flow. Our work provides in-depth security and layout analysis on a challenging benchmark suite. We show that ours can render layouts resilient, with reasonable overheads, against Trojan insertion in general and also against second-order attacks (i.e., adversaries seeking to bypass the locking defense in an oracle-less setting). We release our layout artifacts for independent verification [29] and we will release our methodology's source code.

User Edit Pencil Streamline Icon: https://streamlinehq.com
Authors (10)
  1. Fangzhou Wang (10 papers)
  2. Qijing Wang (2 papers)
  3. Bangqi Fu (2 papers)
  4. Shui Jiang (2 papers)
  5. Xiaopeng Zhang (100 papers)
  6. Lilas Alrahis (22 papers)
  7. Ozgur Sinanoglu (55 papers)
  8. Johann Knechtel (42 papers)
  9. Tsung-Yi Ho (57 papers)
  10. Evangeline F. Y. Young (6 papers)
Citations (11)

Summary

We haven't generated a summary for this paper yet.