ABSTRACT
The dramatic growth of hardware attacks and the lack of security-concern solutions in design tools lead to severe security problems in modern IC designs. Although many existing countermeasures provide decent protection against security issues, they still lack the global design view with sufficient security consideration in design time. This paper proposes a security-aware framework against Trojan insertion, frontside probing, and fault injection attacks at the design stage. The framework consists of two major techniques: (1) a large-scale shielding method that effectively covers the exposed areas of assets and (2) a cell-movement-based method to eliminate the empty spaces vulnerable to Trojan insertion. Experimental results show that our framework effectively reduces the vulnerability of these attacks and achieves the best overall score compared with the top-3 teams in the 2022 ACM ISPD Security Closure of Physical Layouts Contest.
- K. Xiao, D. Forte, Y. Jin, R. Karri, S. Bhunia, and M. Tehranipoor, "Hardware trojans: Lessons learned after one decade of research," ACM Trans. on TODAES, vol. 22, no. 1, pp. 1--23, 2016.Google ScholarDigital Library
- M. Tehranipoor and F. Koushanfar, "A survey of hardware trojan taxonomy and detection," IEEE Design Test of Computers, vol. 27, no. 1, pp. 10--25, 2010.Google ScholarDigital Library
- J. Knechtel, J. Gopinath, J. Bhandari, M. Ashraf, H. Amrouch, S. Borkar, S.-K. Lim, O. Sinanoglu, and R. Karri, "Security closure of physical layouts iccad special session paper," in Proc. of ICCAD, 2021, pp. 1--9.Google Scholar
- H. Wang, D. Forte, M. M. Tehranipoor, and Q. Shi, "Probing attacks on integrated circuits: Challenges and research opportunities," IEEE Design & Test, vol. 34, no. 5, pp. 63--71, 2017.Google ScholarCross Ref
- H. Wang, Q. Shi, A. Nahiyan, D. Forte, and M. M. Tehranipoor, "A physical design flow against front-side probing attacks by internal shielding," IEEE Trans. on CAD, vol. 39, no. 10, pp. 2152--2165, 2020.Google ScholarCross Ref
- A. Barenghi, L. Breveglieri, I. Koren, and D. Naccache, "Fault injection attacks on cryptographic devices: Theory, practice, and countermeasures," Proc. of the IEEE, vol. 100, no. 11, pp. 3056--3076, 2012.Google ScholarCross Ref
- C. Shepherd, K. Markantonakis, N. van Heijningen, D. Aboulkassimi, C. Gaine, T. Heckmann, and D. Naccache, "Physical fault injection and side-channel attacks on mobile devices: A comprehensive analysis," Computers & Security, vol. 111, p. 102471, 2021.Google ScholarDigital Library
- X. Wang, M. Tehranipoor, and J. Plusquellic, "Detecting malicious inclusions in secure hardware: Challenges and solutions," in IEEE International Workshop on HOST, 2008, pp. 15--19.Google Scholar
- K. Xiao, D. Forte, and M. Tehranipoor, "A novel built-in self-authentication technique to prevent inserting hardware trojans," IEEE Trans. on CAD, vol. 33, no. 12, 2014.Google ScholarCross Ref
- M. Nabeel, M. Ashraf, S. Patnaik, V. Soteriou, O. Sinanoglu, and J. Knechtel, "2.5D root of trust: Secure system-level integration of untrusted chiplets," IEEE Trans. on Computers, vol. 69, no. 11, 2020.Google ScholarCross Ref
- X. Guo, R. G. Dutta, J. He, M. M. Tehranipoor, and Y. Jin, "QIF-Verilog: Quantitative information-flow based hardware description languages for pre-silicon security assessment," in IEEE International Symposium on HOST, 2019, pp. 91--100.Google Scholar
- J.-M. Cioranesco, J.-L. Danger, T. Graba, S. Guilley, Y. Mathieu, D. Naccache, and X. T. Ngo, "Cryptographically secure shields," in IEEE International Symposium on HOST, 2014, pp. 25--31.Google Scholar
- Security closure of physical layouts. [Online]. Available: https://wp.nyu.edu/ ispd_22_contest/Google Scholar
- M. Beaumont, B. Hopkins, and T. Newby, "Hardware trojans-prevention, detection, countermeasures (a literature review)," 2011.Google Scholar
- T. Trippel, K. G. Shin, K. B. Bush, and M. Hicks, "Icas: an extensible framework for estimating the susceptibility of ic layouts to additive trojans," in IEEE Symposium on Security and Privacy, 2020, pp. 1742--1759.Google Scholar
- L. Chen, X. Min, C.-K. Koh, J. Cong, and P. H. Madden, "Routability-driven placement and white space allocation," in Proc. of ICCAD, 2004, pp. 394--401.Google Scholar
- M.-K. Hsu, Y.-F. Chen, C.-C. Huang, S. Chou, T.-H. Lin, T.-C. Chen, and Y.-W. Chang, "NTUplace4h: A novel routability-driven placement algorithm for hierarchical mixed-size circuit designs," IEEE Trans. on CAD, vol. 33, no. 12, pp. 1914--1927, 2014.Google ScholarCross Ref
- C.-C. Huang, H.-Y. Lee, B.-Q. Lin, S.-W. Yang, C.-H. Chang, S.-T. Chen, Y.-W. Chang, T.-C. Chen, and I. Bustany, "NTUplace4dr: A detailed-routing-driven placer for mixed-size circuit designs with technology and region constraints," IEEE Trans. on CAD, vol. 37, no. 3, pp. 669--681, 2018.Google ScholarCross Ref
- Nangate freepdk45 open cell library. [Online]. Available: https://si2.org/open-cell-library/Google Scholar
Index Terms
- Security-aware Physical Design against Trojan Insertion, Frontside Probing, and Fault Injection Attacks
Recommendations
Physical fault injection and side-channel attacks on mobile devices: A comprehensive analysis
AbstractToday’s mobile devices contain densely packaged system-on-chips (SoCs) with multi-core, high-frequency CPUs and complex pipelines. In parallel, sophisticated SoC-assisted security mechanisms have become commonplace for protecting ...
QuadSeal: Quadruple Balancing to Mitigate Power Analysis Attacks with Variability Effects and Electromagnetic Fault Injection Attacks
Side channel analysis attacks employ the emanated side channel information to deduce the secret keys from cryptographic implementations by analyzing the power traces during execution or scrutinizing faulty outputs. To be effective, a countermeasure must ...
Hardware Security: Physical Design versus Side-Channel and Fault Attacks
ISPD '22: Proceedings of the 2022 International Symposium on Physical DesignWhat is "hardware" security? How can we improve trustworthiness in hardware circuits? Is there a design method for secure hardware design? To answer these questions, different communities have different expectations of trusted (expecting trustworthy) ...
Comments