Hardware Trojan Detection Solutions and Design-For-Trust Challenges

Hardware Trojan Detection Solutions and Design-For-Trust Challenges

RESEARCH FEATURE Hardware Trojan Detection Solutions and Design-for-Trust Challenges Mohammad Tehranipoor, Hassan Salmani, Xuehui Zhang, and Xiaoxiao Wang University of Connecticut Ramesh Karri, Jeyavijayan Rajendran, and Kurt Rosenfeld Polytechnic Institute of New York University Globalization of the semiconductor industry and evolving fabrication processes have made integrated circuits increasingly vulnerable to Trojans. Researchers must expand efforts to verify trust in intellectual property cores and ICs. ulnerabilities in the current integrated circuit (IC) a trusted design center and foundry, it is expensive and development process have raised serious concerns economically infeasible given current trends in the glo- about possible threats from hardware Trojans balization of IC design and fabrication. On the other hand, to military, financial, transportation, and other verifying trustworthiness requires a postmanufacturing V 1-4 critical systems. An adversary can introduce a Trojan step to validate conformance of the fabricated IC to the through an IC that will disable or destroy a system at some original functional and performance specifications. specific future time. Alternatively, an attacker can design a wire or some other IC component to survive the testing HARDWARE TROJANS phase but fail before the expected lifetime. A hardware A system-on-chip (SoC) design can contain several lay- Trojan can also covertly cause a system to leak confiden- ered and interconnecting functional components, including tial information or secret keys. tens of intellectual property cores designed by vendors Trojans can be implemented as hardware modifica- around the world. There are three basic types of IP cores:5 tions to application-specific integrated circuits (ASICs), commercial off-the-shelf (COTS) parts, microprocessors, • soft IP cores are delivered as synthesizable register microcontrollers, network processors, or digital signal pro- transfer level (RTL) hardware description language cessors (DSPs), or as firmware modifications—for example, (HDL); to field-programmable gate array (FPGA) bitstreams. • hard IP cores are delivered as GDSII representations of To ensure that an IC used by a client is authentic, either a fully placed and routed core design; and the developer must make the IC design and fabrication • firm IP cores are optimized in structure and topology processes trustworthy or the client must verify the IC for for performance and area, possibly using a generic trustworthiness. Because the former approach requires library (GL). 64 COMPUTER Published by the IEEE Computer Society 0018-9162/11/$26.00 © 2011 IEEE Q4, QN4 : inout STD_ IP-core-based design Soft IP cores end SR_Latch4; architecture Behavioral of begin RTL RTL process (R, S, Q4, QN4) 1 N begin Q4 <= QN4 nor R; QN4 <= Q4 nor S; Firm IP cores Cells and Synthesis + DFT I/O Lib GLs GL Hard IP cores Cells and I/O Layout + STA GDSII GDSIIs GDSII System integration ASIC manufacturer Manufacturing Figure 1. Modern system-on-chip design flow consists of IP-core-based design, system integration, and manufacturing. Figure 1 shows a typical SoC design flow, which con- IP cores provided by external vendors. It is thus necessary sists of IP-core-based design, system integration, and to ensure trust in all three parts of the SoC design flow. manufacturing. Designers must verify the trustworthiness of IP cores as Design specification, either by the design house or an well as thoroughly test fabricated ICs to ensure that they outside IP core vendor, is generally the first step. Develop- perform as intended. In addition, because SoC design-flow ers translate this specification into an RTL description in activities can occur at different geographic sites, the lack of VHSIC HDL (VHDL) or Verilog HDL. Various RTL IP cores centralized control makes it extremely difficult to ensure can be used at this stage of the design flow. their trustworthiness—design strategies should accord- Developers synthesize the RTL description into a gate- ingly take trust into account. level netlist based on the logic cells and I/Os of a target Due to the lack of complete verification coverage for technology library, then they integrate gate-level IP cores most IP cores, system integrators commonly perform ad- from a vendor into this netlist. They add design-for-test ditional verification and code coverage analysis. If an IP (DFT) structures to improve the design’s testability. core is encrypted for piracy prevention, the vendor must The next step is to translate the gate-level netlist into provide decryption keys. the physical layout based on cells and I/O geometries. It is possible to import IP cores from vendors in GDSII layout DETECTING TROJANS IN IP CORES file format. After performing static timing analysis (STA) Ensuring trust in IP cores is extremely difficult, as there and power closure, developers generate the final layout in is no golden version against which to compare a given IP GDSII format and send it out for fabrication. core during verification. In theory, an effective way to Trojans can be inserted in ICs at the RTL during design detect a Trojan in an IP core is to activate the Trojan and specification, at the gate level during DFT insertion, at the observe its effects, but the Trojan’s type, size, and location layout level during placement and routing, or during IC are unknown and its activation condition is most likely a manufacturing. An attacker can also insert a Trojan through rare event. JULY 2011 65 RESEARCH FEAturE Synthesis Remove redundant Specication 3PIP circuits Formal verication and Suspicious toggle analysis Testbench signals Equivalence analysis Suspicious Formal verication and coverage analysis signals Trojan Error? Sequential ATPG Suspicious inserted signals Add test patterns Final testbench and Trojan analysis suspicious parts Testbench generation and suspicious signal identi cation Suspicious signal analysis Figure 2. Detecting Trojans in an IP core requires identifying suspicious signals and components. This process has two phases: testbench generation and suspicious signal identification, followed by suspicious signal analysis. Detecting Trojans in an IP core requires identifying sus- during simulation. If the IP core functions perfectly with picious signals and components.6 As Figure 2 shows, this these patterns, the activated suspicious signals should be process has two phases: testbench generation and suspi- part of the original circuit; otherwise, they must be part of cious signal identification, followed by suspicious signal the Trojan. analysis. The flow in the figure focuses on ensuring trust Fault equivalence analysis reduces the number of sus- in soft IP cores, as they are the most dominant cores in picious signals,6,7 but activating the remaining signals is the market today due primarily to the flexibility they offer difficult. To activate these signals and further analyze their SoC designers. impact on circuit function, designers add new gate-level Usually, two specifications are available for each IP core. circuit structures that increase their controllability. The specification from the third-party IP (3PIP) core vendor The last step is to determine whether the suspicious sig- describes the core’s function and cannot be trusted. How- nals are actually part of a Trojan or the circuit. This step is ever, the system integrator’s requirements are trustworthy quite fast because the suspicious signal list is considerably and thus can be verified. smaller. Designers use formal verification6 to verify IP functional- Once SoC designers verify an RTL IP core’s trustwor- ity and apply code coverage analysis to identify suspicious thiness, they incorporate it in the regular design flow as signals and components. Signals and components not ac- shown in Figure 1. tivated during verification are suspected Trojans. Code coverage analysis includes line, statement, finite state ma- DETECTING TROJANS IN FABRICATED chine (FSM), and path coverage at the RTL. CIRCUITS Because redundant circuits in the IP core remain at a Researchers have developed several methods to verify fixed-logic value and thus cannot be activated by input that fabricated ICs are free of Trojans.8-16 Side-channel tech- patterns, designers tentatively remove these circuits from niques analyze power, timing, and other signals. Trojans the list of suspicious signals and components. Designers typically alter the circuit design by degrading performance, revisit these circuits during the Trojan activation step, as changing power characteristics, and introducing reliabil- the Trojan circuit can be redundant as well. ity problems. Other techniques attempt to fully activate Sequential automatic test pattern generation (ATPG) Trojans in an IC by targeting nodes in the circuit multiple methods generate special patterns to change signal values times.8 66 COMPUTER Power-based signal analysis waveform of a Trojan-inserted circuit from that of a Trojan- Transient power in ICs can be used to detect Trojans. free circuit. Trojan activation schemes can be categorized Most Trojans must be connected to the circuit’s power as either region-free or region-aware. supply lines to operate, and any transition in a Trojan will Region-free Trojan activation. Randomization-based draw current from the power distribution network, where methods attempt to systematically activate Trojans, it can be measured externally. Such transitions, however, regardless of where in the IC they might be located. For are submerged in the noise

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    9 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us