Senjie Zhang, Shuai Wang, Jinbo Wang, Shan Zhou, Zhaohui Yao
{"title":"Quantitative Analysis of Information Leakage Hardware Trojans in IP Cores","authors":"Senjie Zhang, Shuai Wang, Jinbo Wang, Shan Zhou, Zhaohui Yao","doi":"10.1109/DSA56465.2022.00063","DOIUrl":null,"url":null,"abstract":"Computing hardware has attracted the attention of malicious attackers due to the globalization of hardware designs and supply chains and the integration of third-party intellectual property (IP) cores. The gate level information flow tracking (GLIFT) method has been proposed to detect information leakage hardware trojans by setting labels and detecting the propagation of labels. However, the existing researches focus on binary labels, which cannot quantify the leaked information and obtain the information leakage path. Therefore, we propose a precise multi-bit label tracking method. By detecting the propagation of the multi-bit labels, we can exactly understand which bits have leaked and the leaked paths. At the same time, in order to reduce the complexity of the multi-bit label propagation logic, we also propose an optimization method. Experiments show that our method can quantitatively analyze information leakage trojans in IP cores, and the optimization method can also reduce the complexity.","PeriodicalId":208148,"journal":{"name":"2022 9th International Conference on Dependable Systems and Their Applications (DSA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 9th International Conference on Dependable Systems and Their Applications (DSA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/DSA56465.2022.00063","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
Computing hardware has attracted the attention of malicious attackers due to the globalization of hardware designs and supply chains and the integration of third-party intellectual property (IP) cores. The gate level information flow tracking (GLIFT) method has been proposed to detect information leakage hardware trojans by setting labels and detecting the propagation of labels. However, the existing researches focus on binary labels, which cannot quantify the leaked information and obtain the information leakage path. Therefore, we propose a precise multi-bit label tracking method. By detecting the propagation of the multi-bit labels, we can exactly understand which bits have leaked and the leaked paths. At the same time, in order to reduce the complexity of the multi-bit label propagation logic, we also propose an optimization method. Experiments show that our method can quantitatively analyze information leakage trojans in IP cores, and the optimization method can also reduce the complexity.