Proceedings of the 50th Hawaii International Conference on System Sciences | 2017 Reverse Engineering Integrated Circuits Using Finite State Machine Analysis Jessica Smithy, Kiri Oler∗, Carl Miller∗, David Manz∗ ∗Pacific Northwest National Laboratory Email: fi[email protected] yWashington State University Email: [email protected] Abstract are expensive and time consumptive but extremely accurate. Due to the lack of a secure supply chain, it is not possible Alternatively, there are a variety of non-destructive imaging to fully trust the integrity of electronic devices. Current methods for determining if an unknown IC is different from methods of verifying integrated circuits are either destruc- an ’assumed-good’ benchmark IC. However, these methods tive or non-specific. Here we expand upon prior work, in often only work for large or active differences, and are which we proposed a novel method of reverse engineering based on the assumption that the benchmark chip has not the finite state machines that integrated circuits are built been corrupted. What is needed, and what we will detail upon in a non-destructive and highly specific manner. In in the following sections, is an algorithm to enable a fast, this paper, we present a methodology for reverse engineering non-destructive method of reverse engineering ICs to ensure integrated circuits, including a mathematical verification of their veracity. We must assume the worst case scenario in a scalable algorithm used to generate minimal finite state which we have no prior knowledge, no design documents, machine representations of integrated circuits. no labeling, or an out-of-production IC. The mathematical theory behind our approach is pre- 1. Introduction sented in two parts. First, we construct a tree representing the IC, and then we determine the underlying state machine The integrity of our computing hardware is of critical based on said tree. The evaluation tree is constructed by concern in industries such as energy generation and distribu- evaluating every possible input stream on the IC. Each tion, aviation, and health care. Many of the ICs that control evaluation tree is unique for each FSM, and any two FSMs our desktop computers, servers, SCADA systems, and a that share the same evaluation tree are equivalent. It should range of other devices are designed in the U.S. but put into be noted that evaluation trees are normal, as defined in silicon overseas. [1] This creates a large gap in our control [6], meaning the ordering on the nodes is preserved, al- of the supply chain which puts all systems that use this lowing for the concept of descendant nodes and subtrees, hardware at risk for modification or injection attacks. Today, which will be necessary as we proceed. Through basic many organizations spend enormous amounts of money pattern matching we can reduce the nodes and subtrees to verifying the integrity of a given piece of hardware; they work backwards towards the original state machine. This are then locked in to that hardware for decades afterwards, work will verify that both operations yield a state machine resulting in obsolete hardware and software running critical equivalent to the implemented machine. In addition, to systems. mathematical verification, we tested our approach using a Currently, there is no way of verifying the integrity of the combined hardware/software implementation (subject to a entire supply chain, from design to use, to ensure the level future publication). of integrity needed. In dividing this work into smaller, more We begin by discussing the foundations of this approach, feasible pieces, we have chosen to focus on examining the previous work, and related material. We then present our end product–the integrated circuit (IC). Many modern ICs contribution to the problem by providing the mathematical are built upon finite state machines (FSMs). In this research, foundation and the specific solution based upon finite state we have developed a method for rediscovering the FSM that machines and tree exploration. an IC is built upon using a nondestructive and intelligent brute force method. Prior work has focused on destructive 2. Prior Work reverse engineering methods that use images of the tran- sistor levels to determine function [2], and nondestructive In theory, a black box is a device which takes inputs characterization techniques like power usage, timing delays, (signals applied to pins or ports) and then responds (via current leakage, and electromagnetic imaging which can be pins, ports, or other methods). The actual process which used to certify an IC against a known-good IC. [3]–[5]. transforms the input into output is unknown. A black box There are a few destructive existing methods for de- test or analysis attempts to discover this functionality with- termining if an IC deviates from the original design; these out damaging the system under test. There are a variety of URI: http://hdl.handle.net/10125/41507 ISBN: 978-0-9981331-0-2 CC-BY-NC-ND 2906 analysis methods, both destructive and nondestructive, that chines. In his Gedanken-Experiments [11], Moore details explore either the physical or logical makeup of the IC. a situation in which a researcher needs to discover the Physical Reverse Engineering The basic destructive functionality of a device without physically dismantling it; method for exploring an IC is relatively simple in concept, his example was drawn from experiences in the world wars, but difficult to execute with the required precision. This and assumed that the device would have an anti-tamper seal method physically removes micrometer thin layers of the IC, that would, upon breaking, destroy the device. In Moore’s paring it down slowly, and taking pictures with an electron paper, an experiment is performed on the state machine by microscope at each layer. [7] It is then possible to, using giving it a specific input sequence and recording the output those images, reconstruct the physical layout of the chip and sequence. Moore posits that, given two fully reachable state work upwards through the layers to recreate the transistor machines, S and T, each with a table of input sequences mapping. With the right tools and techniques, this is a very and the corresponding outputs which are produced upon the accurate and exact method. However, it is also destructive entry of the input into the system, these two state machines to the extreme - after stripping the IC down, there is nothing are isomorphic if the input and output table obtained from left but the plastic base and I/O pins. With some knowledge, querying state machine S can be obtained by substituting it is possible to perform invasive probing of the IC, rather new names for the input/output table obtained from state than a full destructive reverse engineering, to perform a more machine T, and vice versa. Isomorphic machines will always limited quality control check on the IC. In invasive probing, have the same behavior; they are indistinguishable from one a very fine probe is inserted into the IC, after removal of another by any experiment, sequential or branching. State qj the outer plastic or ceramic casing. This is usually only is indistinguishable from state qi (both of state machine S) if performed on exposed faces (not moving into deeper layers and only if every experiment performed beginning with state of the IC), due to the extreme difficulty of drilling into the qj has the same output as the same experiment performed IC without damaging any of the surrounding components. on qi. Two states are distinguishable only if they are not [8] indistinguishable. It is then also possible to state that state IC Characterizations Invasive probing and destructive qi of machine S is distinguishable from state qj of machine T reverse engineering damage the IC under test, often beyond if there exists an experiment that, if the same input is placed any further usage. Other methods, such as structural, optical, on both machines starting with their respective initial states, or electrical characterizations [9], can be used to gain a the output is not identical. less destructive but also a less detailed understanding of the Moore’s method, while logically sound, applied only to IC. While these analysis methods cannot provide in-depth abstract or conceptual state machines. Real FSMs embedded description of functionality that probing and reverse engi- in ICs pose additional complications, such as non-fully neering can, they do provide a method for quickly checking reachable state machines and more complex state machines, for deviations from a known-good IC. These methods are as well as the physical limitations inherent in interacting more often used by manufacturers on samples from bulk IC with a real IC. A non-destructive method of characterization purchases. The primary method of nondestructive fault de- of the FSM an IC implements was proposed by Brutscheck, tection in an IC uses electromagnetic, heat, or other physical et al. [14], which shows potential in implementing Moore’s outputs from the IC to determine a known-good baseline and algorithms. The Brustcheck method follows several stages. then compare to this baseline for detection of alterations. The first of these is the pin determination based on elec- It has been shown that in older ICs, each state switch of trostatic discharge theory, as described in [9], [17], and a transistor outputs a small amount of photons that can be applied in both [15], [18], followed by a determination of detected. For example, in an IC designed to perform an AES the IC type: combinatorial, sequential linear, or sequential encryption, the initial AES key can be recovered through this nonlinear. The FSM is then divided into Mealy or Moore type of characterization. [10] Most other imaging methods automata. These determinations are assumed in this work; are not this precise; they can detect unusual variations in the the Brutscheck method fulfills the requirements to determine IC structure to 1 or 2 millimeters, which is not enormously the state machine competently and does not require further helpful in determining what internally, at the transistor level, advancement.
Details
-
File Typepdf
-
Upload Time-
-
Content LanguagesEnglish
-
Upload UserAnonymous/Not logged-in
-
File Pages9 Page
-
File Size-