为硬件木马检测提供方便的混淆侧信道分析

Arash Nejat, D. Hély, V. Beroulle
{"title":"为硬件木马检测提供方便的混淆侧信道分析","authors":"Arash Nejat, D. Hély, V. Beroulle","doi":"10.1109/IDT.2015.7396749","DOIUrl":null,"url":null,"abstract":"Integrated Circuit (IC) piracy and malicious alteration, named as Hardware Trojan (HT), are two important threats which may happen in untrusted foundries. Functionality obfuscation has been proposed against IP/IC piracy. Obfuscation can also offer opportunities to defeat HT insertion, because the HT designer cannot understand the functionality of the obfuscated ICs. In addition various HT detection methods have been proposed based on conventional functional or structural tests, and side channel analysis. Conventional functional or structural tests are inefficient if the HT is not completely activated. HT detection by side channel analysis faces Process Variation (PV) and Environment Variation (EV). An HT is detectable if its effect is significant among PV and EV. In this work we propose to use obfuscation methods to facilitate power and path delay analysis based HT detection methods. Since shorter paths have less PV than longer paths; the first approach is to generate shorter paths for nets that only belong to long paths, while the circuit is being obfuscated. The second suggested approach is to increase the proportion of HT dynamic power to the total dynamic power of circuit, while the circuit is being obfuscated. The success of power analysis based HT detection methods is increased by increasing this proportion.","PeriodicalId":321810,"journal":{"name":"2015 10th International Design & Test Symposium (IDT)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"9","resultStr":"{\"title\":\"Facilitating side channel analysis by obfuscation for Hardware Trojan detection\",\"authors\":\"Arash Nejat, D. Hély, V. Beroulle\",\"doi\":\"10.1109/IDT.2015.7396749\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Integrated Circuit (IC) piracy and malicious alteration, named as Hardware Trojan (HT), are two important threats which may happen in untrusted foundries. Functionality obfuscation has been proposed against IP/IC piracy. Obfuscation can also offer opportunities to defeat HT insertion, because the HT designer cannot understand the functionality of the obfuscated ICs. In addition various HT detection methods have been proposed based on conventional functional or structural tests, and side channel analysis. Conventional functional or structural tests are inefficient if the HT is not completely activated. HT detection by side channel analysis faces Process Variation (PV) and Environment Variation (EV). An HT is detectable if its effect is significant among PV and EV. In this work we propose to use obfuscation methods to facilitate power and path delay analysis based HT detection methods. Since shorter paths have less PV than longer paths; the first approach is to generate shorter paths for nets that only belong to long paths, while the circuit is being obfuscated. The second suggested approach is to increase the proportion of HT dynamic power to the total dynamic power of circuit, while the circuit is being obfuscated. The success of power analysis based HT detection methods is increased by increasing this proportion.\",\"PeriodicalId\":321810,\"journal\":{\"name\":\"2015 10th International Design & Test Symposium (IDT)\",\"volume\":\"7 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2015-12-15\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"9\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2015 10th International Design & Test Symposium (IDT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/IDT.2015.7396749\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 10th International Design & Test Symposium (IDT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IDT.2015.7396749","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 9

摘要

集成电路(IC)盗版和恶意修改,即硬件木马(HT),是不受信任的代工厂可能发生的两种重要威胁。针对IP/IC盗版,提出了功能混淆。混淆也可以提供挫败HT插入的机会,因为HT设计人员无法理解被混淆的ic的功能。此外,基于常规的功能或结构测试以及侧信道分析,提出了各种HT检测方法。如果HT没有完全激活,传统的功能或结构测试是无效的。侧通道分析的高温检测面临着工艺变化(PV)和环境变化(EV)两大问题。如果对PV和EV的影响显著,则可以检测到HT。在这项工作中,我们提出使用混淆方法来促进基于功率和路径延迟分析的高温检测方法。因为较短路径的PV小于较长路径;第一种方法是为只属于长路径的网络生成较短的路径,同时对电路进行混淆。第二种建议的方法是在对电路进行模糊处理的同时,增加HT动态功率占电路总动态功率的比例。增加这一比例可以提高基于功率分析的高温检测方法的成功率。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Facilitating side channel analysis by obfuscation for Hardware Trojan detection
Integrated Circuit (IC) piracy and malicious alteration, named as Hardware Trojan (HT), are two important threats which may happen in untrusted foundries. Functionality obfuscation has been proposed against IP/IC piracy. Obfuscation can also offer opportunities to defeat HT insertion, because the HT designer cannot understand the functionality of the obfuscated ICs. In addition various HT detection methods have been proposed based on conventional functional or structural tests, and side channel analysis. Conventional functional or structural tests are inefficient if the HT is not completely activated. HT detection by side channel analysis faces Process Variation (PV) and Environment Variation (EV). An HT is detectable if its effect is significant among PV and EV. In this work we propose to use obfuscation methods to facilitate power and path delay analysis based HT detection methods. Since shorter paths have less PV than longer paths; the first approach is to generate shorter paths for nets that only belong to long paths, while the circuit is being obfuscated. The second suggested approach is to increase the proportion of HT dynamic power to the total dynamic power of circuit, while the circuit is being obfuscated. The success of power analysis based HT detection methods is increased by increasing this proportion.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信