论文标题
最终布局中的盲件硬件插入的务实方法
A Pragmatic Methodology for Blind Hardware Trojan Insertion in Finalized Layouts
论文作者
论文摘要
综合电路(IC)的潜在脆弱性是制造过程中硬件木马(HTS)的插入。了解这种攻击的实用性可能会导致适当的措施减轻它。在本文中,我们展示了一个务实的框架,用于分析最终布局的HT敏感性。我们的框架代表了制造时间攻击,在该攻击中,假定对手只能访问电路的布局表示。该框架将特洛伊木马插入使用工程变更顺序(ECO)流的磁带就绪布局中。使用反向工程技术盲目搜索了攻击的安全节点。为了进行实验研究,我们利用了三个加密核核(AES-128,SHA-256和RSA)和一个微控制器(RISC-V)作为目标。我们探索了框架的触发器,有效载荷和目标的96个组合。我们的发现表明,即使在高密度的设计中,也可以对复杂的特洛伊木马的秘密插入。所有这些,同时保持原始目标逻辑,对功率和性能的影响最小。此外,从我们的探索中,我们得出的结论是,它太幼稚了,无法将放置资源用作HT脆弱性的指标。这项工作强调,HT插入成功是位置,路由资源,攻击节点的位置以及进一步特定设计特定特征的复杂功能。结果,我们的框架不仅仅是攻击,我们提出了最先进的分析工具,以评估HT插入最终布局的脆弱性。
A potential vulnerability for integrated circuits (ICs) is the insertion of hardware trojans (HTs) during manufacturing. Understanding the practicability of such an attack can lead to appropriate measures for mitigating it. In this paper, we demonstrate a pragmatic framework for analyzing HT susceptibility of finalized layouts. Our framework is representative of a fabrication-time attack, where the adversary is assumed to have access only to a layout representation of the circuit. The framework inserts trojans into tapeout-ready layouts utilizing an Engineering Change Order (ECO) flow. The attacked security nodes are blindly searched utilizing reverse-engineering techniques. For our experimental investigation, we utilized three crypto-cores (AES-128, SHA-256, and RSA) and a microcontroller (RISC-V) as targets. We explored 96 combinations of triggers, payloads and targets for our framework. Our findings demonstrate that even in high-density designs, the covert insertion of sophisticated trojans is possible. All this while maintaining the original target logic, with minimal impact on power and performance. Furthermore, from our exploration, we conclude that it is too naive to only utilize placement resources as a metric for HT vulnerability. This work highlights that the HT insertion success is a complex function of the placement, routing resources, the position of the attacked nodes, and further design-specific characteristics. As a result, our framework goes beyond just an attack, we present the most advanced analysis tool to assess the vulnerability of HT insertion into finalized layouts.