Analysis of Hardware Trojan Resilience Enabled through Logic Locking

2022 Asian Hardware Oriented Security and Trust Symposium (AsianHOST)(2022)

引用 0|浏览7
暂无评分
摘要
Emerging threats to hardware Intellectual Property (IP) confidentiality due to the horizontal business model have come in the form of piracy, reverse engineering, and extraction of design secrets. These threats have led to the development of promising IP protection solutions, which include logic locking and hardware obfuscation. While logic locking has been mainly developed for protecting confidentiality of hardware IPs, it may also provide other security benefits that extend beyond IP theft and into defending design integrity against malicious design modifications, referred to as hardware Trojan attacks. Hardware Trojan attacks are realized through insertion of stealthy malicious logic in a design, often activated under rare conditions, so as to evade detection. Existing countermeasures against Trojan attacks primarily focus on detection of an attack through targeted verification approach or its prevention through design solutions. In this paper, we present an investigation on the role of state-of-the-art logic locking methods for protecting against hardware Trojan attacks. We discuss beneficial attributes of logic locking that can contribute to Trojan prevention and significant reduction in its efficacy. We introduce metrics to describe and quantify these phenomena. Through extensive experimental validation and practical Trojan insertion, we show that on average effective logic locking can offer around 87% reduction in Trojan activation success and around 1000x increase in Trojan activation probability of those successfully inserted.
更多
查看译文
关键词
Hardware Trojan,Logic Locking,Metric
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要