How secure is split manufacturing in preventing hardware trojan?

With the trend of outsourcing fabrication, split manufacturing is regarded as a promising way to both provide the high-end nodes in untrusted external foundries and protect the design from potential attackers. However, in this work, we show that split manufacturing is not inherently secure. A hardware trojan attacker can still discover necessary information with a simulated annealing based attack approach at the placement level. We further propose a defense approach by moving the insecure gates away from their easily-attacked candidate locations. Experimental results on benchmark circuits show the effectiveness of our proposed methods.

[1]  Dick James,et al.  The state-of-the-art in semiconductor reverse engineering , 2011, 2011 48th ACM/EDAC/IEEE Design Automation Conference (DAC).

[2]  Yuanyuan Zhou,et al.  Designing and Implementing Malicious Hardware , 2008, LEET.

[3]  Julien Francq,et al.  Introduction to hardware Trojan detection methods , 2015, 2015 Design, Automation & Test in Europe Conference & Exhibition (DATE).

[4]  Yu Wang,et al.  A General Framework for Hardware Trojan Detection in Digital Circuits by Statistical Learning Algorithms , 2017, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.

[5]  Yiqiang Zhao,et al.  Hardware Trojan Detection Through Chip-Free Electromagnetic Side-Channel Statistical Analysis , 2017, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.

[6]  Georg Sigl,et al.  Hardware Trojans: current challenges and approaches , 2014, IET Comput. Digit. Tech..

[7]  Yier Jin,et al.  Introduction to Hardware Security , 2015, Electronics.

[8]  Jeyavijayan Rajendran,et al.  Towards a comprehensive and systematic classification of hardware Trojans , 2010, Proceedings of 2010 IEEE International Symposium on Circuits and Systems.

[9]  Swarup Bhunia,et al.  HARPOON: An Obfuscation-Based SoC Design Methodology for Hardware Protection , 2009, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.

[10]  John P. Hayes,et al.  Unveiling the ISCAS-85 Benchmarks: A Case Study in Reverse Engineering , 1999, IEEE Des. Test Comput..

[11]  Jeyavijayan Rajendran,et al.  The cat and mouse in split manufacturing , 2016, 2016 53nd ACM/EDAC/IEEE Design Automation Conference (DAC).

[12]  Azadeh Davoodi,et al.  Are proximity attacks a threat to the security of split manufacturing of integrated circuits? , 2016, 2016 IEEE/ACM International Conference on Computer-Aided Design (ICCAD).

[13]  Abhijit Chatterjee,et al.  A new simultaneous circuit partitioning and chip placement approach based on simulated annealing , 1991, DAC '90.

[14]  Yongqiang Lyu,et al.  A Survey of Hardware Trojan Detection, Diagnosis and Prevention , 2015, 2015 14th International Conference on Computer-Aided Design and Computer Graphics (CAD/Graphics).

[15]  Lawrence T. Pileggi,et al.  Building trusted ICs using split fabrication , 2014, 2014 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST).

[16]  Chris C. N. Chu,et al.  FastPlace 3.0: A Fast Multilevel Quadratic Placement Algorithm with Placement Congestion Control , 2007, 2007 Asia and South Pacific Design Automation Conference.

[17]  Yiorgos Makris,et al.  Hardware Trojan detection using path delay fingerprint , 2008, 2008 IEEE International Workshop on Hardware-Oriented Security and Trust.

[18]  Qiang Liu,et al.  A survey of hardware Trojan threat and defense , 2016, Integr..

[19]  Lawrence T. Pileggi,et al.  Detecting reliability attacks during split fabrication using test-only BEOL stack , 2014, 2014 51st ACM/EDAC/IEEE Design Automation Conference (DAC).

[20]  Dick James,et al.  Reverse Engineering in the Semiconductor Industry , 2007, 2007 IEEE Custom Integrated Circuits Conference.

[21]  Jarrod A. Roy,et al.  Ending Piracy of Integrated Circuits , 2010, Computer.

[22]  Carl Sechen Chip-planning, placement, and global routing of macro/custom cell integrated circuits using simulated annealing , 1988, 25th ACM/IEEE, Design Automation Conference.Proceedings 1988..

[23]  Sanjit A. Seshia,et al.  Reverse engineering circuits using behavioral pattern mining , 2012, 2012 IEEE International Symposium on Hardware-Oriented Security and Trust.

[24]  Peter Gadfort,et al.  Split-fabrication obfuscation: Metrics and techniques , 2014, 2014 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST).

[25]  Siddharth Garg,et al.  Securing Computer Hardware Using 3D Integrated Circuit (IC) Technology and Split Manufacturing for Obfuscation , 2013, USENIX Security Symposium.

[26]  Jeyavijayan Rajendran,et al.  Hardware security: Threat models and metrics , 2013, 2013 IEEE/ACM International Conference on Computer-Aided Design (ICCAD).

[27]  Jeyavijayan Rajendran,et al.  Is split manufacturing secure? , 2013, 2013 Design, Automation & Test in Europe Conference & Exhibition (DATE).

[28]  Ankur Srivastava,et al.  Security-Aware 2.5D Integrated Circuit Design Flow Against Hardware IP Piracy , 2017, Computer.