On automating delayered IC analysis for hardware IP protection

Esha Sarkar, Michail Maniatakos

Research output: Contribution to conferencePaperpeer-review

Abstract

Fabrication of Integrated Circuits (ICs) is outsourced to third-party foundries to decrease time to market and production cost. Outsourcing renders the ICs vulnerable to malicious modifications. These malicious circuit modifications, known as Hardware Trojans (HTs), tamper with the integrity of intellectual property cores and hence, must be detected accurately. A highly accurate method for detecting HTs is through time-consuming physical inspection of reverse-engineered chips. Apparently, physically inspection of all suspected chips is unrealistic. Therefore, the knowledge gained from reverse engineering a single infected IC should be used to detect trojans non-invasively in other ICs. The extra malicious logic, in other suspected chips, can be triggered using suitable test patterns leading to its detection. In order to facilitate detection using test patterns, however, the HT should be mapped to the golden circuit, and automated tools should be used to find appropriate patterns. In this work, we explore the feasibility of this two-step methodology for HT detection by discussing the required steps and identifying the unsolved challenges in each step.

Original languageEnglish (US)
Pages205-210
Number of pages6
DOIs
StatePublished - 2019
Event2019 International Conference Omni-Layer Intelligent Systems, COINS 2019 - Crete, Greece
Duration: May 5 2019May 7 2019

Conference

Conference2019 International Conference Omni-Layer Intelligent Systems, COINS 2019
Country/TerritoryGreece
CityCrete
Period5/5/195/7/19

Keywords

  • Automated IC analysis
  • Automated Test Pattern Generation
  • Hardware Trojans
  • IC Reverse Engineering

ASJC Scopus subject areas

  • Software
  • Human-Computer Interaction
  • Computer Vision and Pattern Recognition
  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'On automating delayered IC analysis for hardware IP protection'. Together they form a unique fingerprint.

Cite this