Due to cost benefits, supply chains of integrated circuits (ICs) are largely outsourced nowadays. However, passing ICs through various third-party providers gives rise to many threats, like piracy of IC intellectual property or insertion of hardware Trojans, i.e., malicious circuit modifications. In this work, we proactively and systematically harden the physical layouts of ICs against post-design insertion of Trojans. Toward that end, we propose a multiplexer-based logic-locking scheme that is (i) devised for layout-level Trojan prevention, (ii) resilient against state-of-the-art, oracle-less machine learning attacks, and (iii) fully integrated into a tailored, yet generic, commercial-grade design flow. Our work provides in-depth security and layout analysis on a challenging benchmark suite. We show that ours can render layouts resilient, with reasonable overheads, against Trojan insertion in general and also against second-order attacks (i.e., adversaries seeking to bypass the locking defense in an oracle-less setting). We release our layout artifacts for independent verification [29] and we will release our methodology's source code.
翻译:由于成本效益,集成电路供应链现在基本上外包。然而,通过各种第三方供应商通过国际电路传递国际电路引起了许多威胁,例如盗版IC知识产权或插入硬件Trojans,即恶意电路改造。在这项工作中,我们积极主动和系统地加强国际电路的物理布局,防止Trojans在设计后插入Trojans。为此,我们提议了一个基于多重轴心的逻辑锁定计划:(一) 设计用于布局层面的Trojan预防,(二) 抵御最先进的无触电机学习攻击,(三) 完全融入一个专门但又通用的商业级设计流程。我们的工作为具有挑战性的基准套件提供了深入的安全和布局分析。我们表明,我们的布局能够适应性,有合理的间接费用,一般地插入Trojan,以及二级攻击(即敌对者试图绕过封闭式或无序的防御)。我们将释放我们的布局文物用于独立核查[29],我们将释放我们的源码方法。