针对硬件木马入侵的区块链掩码编写

Akshay Kulkarni, Noor Ahmad Hazari, M. Niamat
{"title":"针对硬件木马入侵的区块链掩码编写","authors":"Akshay Kulkarni, Noor Ahmad Hazari, M. Niamat","doi":"10.1109/eIT57321.2023.10187268","DOIUrl":null,"url":null,"abstract":"Globalization of integrated circuits (ICs) may lead to the quality of ICs being compromised due to the possible untrusted entities involved in the supply chain. There have been well documented cases of chips secretly implanted with Trojans creeping into the supply chain. Studies have shown that tampering lithographic masks, also called as reticles, is one of the potential sources of hardware Trojan intrusion. This paper presents a novel blockchain-enabled mask writing technique to combat the alteration of the IC layout design at the mask making step. A blockchain-enabled file storage and transfer system for secure transfer of the layout GDSII file from the design house to the mask making machine is studied in this work. As part of this investigation, a smart contract is developed, which interacts with an external application programming interface (API) and fetches the design layout file from the file storage system. The smart contract developed as part of the research can be adopted in the existing EDA tools for mask making, curtailing the access sought by an adversary in the mask making process. The proposed smart contract is developed using Solidity language, on an online IDE called Remix. Finally, a case study is presented in this paper, validating the approach and simulating the proposed smart contract. The simulation of the smart contract is conducted on Goerli test network provided by Ethereum.","PeriodicalId":113717,"journal":{"name":"2023 IEEE International Conference on Electro Information Technology (eIT)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Towards Blockchain-enabled Mask Writing for Security against Hardware Trojan Intrusion\",\"authors\":\"Akshay Kulkarni, Noor Ahmad Hazari, M. Niamat\",\"doi\":\"10.1109/eIT57321.2023.10187268\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Globalization of integrated circuits (ICs) may lead to the quality of ICs being compromised due to the possible untrusted entities involved in the supply chain. There have been well documented cases of chips secretly implanted with Trojans creeping into the supply chain. Studies have shown that tampering lithographic masks, also called as reticles, is one of the potential sources of hardware Trojan intrusion. This paper presents a novel blockchain-enabled mask writing technique to combat the alteration of the IC layout design at the mask making step. A blockchain-enabled file storage and transfer system for secure transfer of the layout GDSII file from the design house to the mask making machine is studied in this work. As part of this investigation, a smart contract is developed, which interacts with an external application programming interface (API) and fetches the design layout file from the file storage system. The smart contract developed as part of the research can be adopted in the existing EDA tools for mask making, curtailing the access sought by an adversary in the mask making process. The proposed smart contract is developed using Solidity language, on an online IDE called Remix. Finally, a case study is presented in this paper, validating the approach and simulating the proposed smart contract. The simulation of the smart contract is conducted on Goerli test network provided by Ethereum.\",\"PeriodicalId\":113717,\"journal\":{\"name\":\"2023 IEEE International Conference on Electro Information Technology (eIT)\",\"volume\":\"7 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-05-18\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2023 IEEE International Conference on Electro Information Technology (eIT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/eIT57321.2023.10187268\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 IEEE International Conference on Electro Information Technology (eIT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/eIT57321.2023.10187268","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

集成电路的全球化可能会导致集成电路的质量受到影响,因为供应链中可能存在不可信的实体。有充分的证据表明,芯片被秘密植入木马病毒,悄悄进入供应链。研究表明,篡改光刻掩码(又称光刻掩码)是硬件木马入侵的潜在来源之一。本文提出了一种新的支持区块链的掩码编写技术,以防止掩码制作步骤中IC布局设计的更改。本文研究了一种基于区块链的文件存储和传输系统,用于将布局GDSII文件从设计室安全传输到掩模制作机。作为调查的一部分,开发了一个智能合约,它与外部应用程序编程接口(API)交互,并从文件存储系统中获取设计布局文件。作为研究的一部分开发的智能合约可以在现有的EDA工具中用于面具制作,从而减少对手在面具制作过程中寻求的访问。拟议的智能合约是在一个名为Remix的在线IDE上使用Solidity语言开发的。最后,本文给出了一个案例研究,验证了该方法并模拟了所提出的智能合约。智能合约的仿真在以太坊提供的Goerli测试网络上进行。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Towards Blockchain-enabled Mask Writing for Security against Hardware Trojan Intrusion
Globalization of integrated circuits (ICs) may lead to the quality of ICs being compromised due to the possible untrusted entities involved in the supply chain. There have been well documented cases of chips secretly implanted with Trojans creeping into the supply chain. Studies have shown that tampering lithographic masks, also called as reticles, is one of the potential sources of hardware Trojan intrusion. This paper presents a novel blockchain-enabled mask writing technique to combat the alteration of the IC layout design at the mask making step. A blockchain-enabled file storage and transfer system for secure transfer of the layout GDSII file from the design house to the mask making machine is studied in this work. As part of this investigation, a smart contract is developed, which interacts with an external application programming interface (API) and fetches the design layout file from the file storage system. The smart contract developed as part of the research can be adopted in the existing EDA tools for mask making, curtailing the access sought by an adversary in the mask making process. The proposed smart contract is developed using Solidity language, on an online IDE called Remix. Finally, a case study is presented in this paper, validating the approach and simulating the proposed smart contract. The simulation of the smart contract is conducted on Goerli test network provided by Ethereum.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信