TY - GEN
T1 - Security Closure of IC Layouts Against Hardware Trojans
AU - Wang, Fangzhou
AU - Wang, Qijing
AU - Fu, Bangqi
AU - Jiang, Shui
AU - Zhang, Xiaopeng
AU - Alrahis, Lilas
AU - Sinanoglu, Ozgur
AU - Knechtel, Johann
AU - Ho, Tsung Yi
AU - Young, Evangeline F.Y.
N1 - Publisher Copyright:
© 2023 ACM.
PY - 2023/3/26
Y1 - 2023/3/26
N2 - Due to cost benefits, supply chains of integrated circuits (ICs) are largely outsourced nowadays. However, passing ICs through various third-party providers gives rise to many threats, like piracy of IC intellectual property or insertion of hardware Trojans, i.e., malicious circuit modifications. In this work, we proactively and systematically harden the physical layouts of ICs against post-design insertion of Trojans. Toward that end, we propose a multiplexer-based logic-locking scheme that is (i) devised for layout-level Trojan prevention, (ii) resilient against state-of-The-Art, oracle-less machine learning attacks, and (iii) fully integrated into a tailored, yet generic, commercial-grade design flow. Our work provides in-depth security and layout analysis on a challenging benchmark suite. We show that ours can render layouts resilient, with reasonable overheads, against Trojan insertion in general and also against second-order attacks (i.e., adversaries seeking to bypass the locking defense in an oracle-less setting). We release our layout artifacts for independent verification[29].
AB - Due to cost benefits, supply chains of integrated circuits (ICs) are largely outsourced nowadays. However, passing ICs through various third-party providers gives rise to many threats, like piracy of IC intellectual property or insertion of hardware Trojans, i.e., malicious circuit modifications. In this work, we proactively and systematically harden the physical layouts of ICs against post-design insertion of Trojans. Toward that end, we propose a multiplexer-based logic-locking scheme that is (i) devised for layout-level Trojan prevention, (ii) resilient against state-of-The-Art, oracle-less machine learning attacks, and (iii) fully integrated into a tailored, yet generic, commercial-grade design flow. Our work provides in-depth security and layout analysis on a challenging benchmark suite. We show that ours can render layouts resilient, with reasonable overheads, against Trojan insertion in general and also against second-order attacks (i.e., adversaries seeking to bypass the locking defense in an oracle-less setting). We release our layout artifacts for independent verification[29].
KW - Hardware Trojans
KW - ISPD'22 contest
KW - Logic locking
KW - Physical design
KW - Security closure
UR - http://www.scopus.com/inward/record.url?scp=85151550222&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85151550222&partnerID=8YFLogxK
U2 - 10.1145/3569052.3571878
DO - 10.1145/3569052.3571878
M3 - Conference contribution
AN - SCOPUS:85151550222
T3 - Proceedings of the International Symposium on Physical Design
SP - 229
EP - 237
BT - ISPD 2023 - Proceedings of the 2023 International Symposium on Physical Design
PB - Association for Computing Machinery
T2 - 32nd ACM International Symposium on Physical Design, ISPD 2023
Y2 - 26 March 2023 through 29 March 2023
ER -