Golden Gates: A New Hybrid Approach for Rapid Hardware Trojan Detection using Testing and Imaging

Hardware Trojans are malicious modifications on integrated circuits (IC), which pose a grave threat to the security of modern military and commercial systems. Existing methods of detecting hardware Trojans are plagued by the inability of detecting all Trojans, reliance on golden chip that might not be available, high time cost, and low accuracy. In this paper, we present Golden Gates, a novel detection method designed to achieve a comparable level of accuracy to full reverse engineering, yet paying only a fraction of its cost in time. The proposed method inserts golden gate circuits (GGC) to achieve superlative accuracy in the classification of all existing gate footprints using rapid scanning electron microscopy (SEM) and backside ultra thinning. Possible attacks against GGC as well as malicious modifications on interconnect layers are discussed and addressed with secure built-in exhaustive test infrastructure. Evaluation with real SEM images demonstrate high classification accuracy and resistance to attacks of the proposed technique.

[1]  Qihang Shi,et al.  Obfuscated Built-In Self-Authentication With Secure and Efficient Wire-Lifting , 2019, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.

[2]  Yu Liu,et al.  Hardware Trojan detection through golden chip-free statistical side-channel fingerprinting , 2014, 2014 51st ACM/EDAC/IEEE Design Automation Conference (DAC).

[3]  M. Tehranipoor,et al.  Hardware Trojans: Lessons Learned after One Decade of Research , 2016, TODE.

[4]  Assia Tria,et al.  A high efficiency Hardware Trojan detection technique based on fast SEM imaging , 2015, 2015 Design, Automation & Test in Europe Conference & Exhibition (DATE).

[5]  Mark Mohammad Tehranipoor,et al.  A Survey on Chip to System Reverse Engineering , 2016, JETC.

[6]  Swarup Bhunia,et al.  Towards Trojan-Free Trusted ICs: Problem Analysis and Detection Scheme , 2008, 2008 Design, Automation and Test in Europe.

[7]  Seiji Matsuura,et al.  Evaluation of variation of root shape of Japanese radish (Raphanus sativus L.) based on image analysis using elliptic Fourier descriptors , 1998, Euphytica.

[8]  Dhruva Acharyya,et al.  Detecting Trojans Through Leakage Current Analysis Using Multiple Supply Pad ${I}_{\rm DDQ}$s , 2010, IEEE Transactions on Information Forensics and Security.

[9]  N. Otsu A threshold selection method from gray level histograms , 1979 .

[10]  Dick James,et al.  The State-of-the-Art in IC Reverse Engineering , 2009, CHES.

[11]  Yiorgos Makris,et al.  Hardware Trojan detection using path delay fingerprint , 2008, 2008 IEEE International Workshop on Hardware-Oriented Security and Trust.

[12]  Farinaz Koushanfar,et al.  A Survey of Hardware Trojan Taxonomy and Detection , 2010, IEEE Design & Test of Computers.

[13]  Azriel Rosenfeld,et al.  Digital Picture Processing , 1976 .

[14]  Nidish Vashistha,et al.  Trojan Scanner: Detecting Hardware Trojans with Rapid SEM Imaging Combined with Image Processing and Machine Learning , 2018, ISTFA 2018: Conference Proceedings from the 44th International Symposium for Testing and Failure Analysis.

[15]  Dana H. Ballard,et al.  Generalizing the Hough transform to detect arbitrary shapes , 1981, Pattern Recognit..

[16]  Mark Mohammad Tehranipoor,et al.  A Novel Technique for Improving Hardware Trojan Detection and Reducing Trojan Activation Time , 2012, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.

[17]  G. Diaz,et al.  Elliptic fourier analysis of cell and nuclear shapes. , 1989, Computers and biomedical research, an international journal.

[18]  Michael S. Hsiao,et al.  Hardware Trojan Attacks: Threat Analysis and Countermeasures , 2014, Proceedings of the IEEE.

[19]  E. L. Principe,et al.  Steps Toward Automated Deprocessing of Integrated Circuits , 2017 .

[20]  Ryan M. Rifkin,et al.  In Defense of One-Vs-All Classification , 2004, J. Mach. Learn. Res..

[21]  Assia Tria,et al.  SEMBA: A SEM based acquisition technique for fast invasive Hardware Trojan detection , 2015, 2015 European Conference on Circuit Theory and Design (ECCTD).

[22]  Sally Adee,et al.  The Hunt For The Kill Switch , 2008, IEEE Spectrum.

[23]  Ajay Joshi,et al.  Detecting Hardware Trojans using backside optical imaging of embedded watermarks , 2015, 2015 52nd ACM/EDAC/IEEE Design Automation Conference (DAC).

[24]  Bah-Hwee Gwee,et al.  A highly efficient method for extracting FSMs from flattened gate-level netlist , 2010, Proceedings of 2010 IEEE International Symposium on Circuits and Systems.

[25]  Berk Sunar,et al.  Trojan Detection using IC Fingerprinting , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).

[26]  Tim Ellis,et al.  Recognizing hand gesture using Fourier descriptors , 2004, ICPR 2004.

[27]  Tardi Tjahjadi,et al.  Silhouette-based gait recognition using Procrustes shape analysis and elliptic Fourier descriptors , 2012, Pattern Recognit..

[28]  Ankur Srivastava,et al.  On application of one-class SVM to reverse engineering-based hardware Trojan detection , 2014, Fifteenth International Symposium on Quality Electronic Design.

[29]  Ming Zhang,et al.  Circuit Failure Prediction and Its Application to Transistor Aging , 2007, 25th IEEE VLSI Test Symposium (VTS'07).

[30]  R. Xu,et al.  IDDQ trending as a precursor to semiconductor failure , 2008, 2008 International Conference on Prognostics and Health Management.

[31]  Christos A. Papachristou,et al.  MERO: A Statistical Approach for Hardware Trojan Detection , 2009, CHES.

[32]  Qihang Shi,et al.  Deterrent Approaches Against Hardware Trojan Insertion , 2018 .

[33]  Todd J. Wagner Hierarchical Layout Verification , 1985, IEEE Design & Test of Computers.

[34]  Swarup Bhunia,et al.  TeSR: A robust Temporal Self-Referencing approach for Hardware Trojan detection , 2011, 2011 IEEE International Symposium on Hardware-Oriented Security and Trust.

[35]  Mark Mohammad Tehranipoor,et al.  Detecting malicious inclusions in secure hardware: Challenges and solutions , 2008, 2008 IEEE International Workshop on Hardware-Oriented Security and Trust.