Design companies often outsource their integrated circuit (IC) fabrication to third parties where ICs are susceptible to malicious acts such as the insertion of a side-channel hardware trojan horse (SCT). In this paper, we present a framework for designing and inserting an SCT based on an engineering change order (ECO) flow, which makes it the first to disclose how effortlessly a trojan can be inserted into an IC. The trojan is designed with the goal of leaking multiple bits per power signature reading. Our findings and results show that a rogue element within a foundry has, today, all means necessary for performing a foundry-side attack via ECO.
翻译:设计公司往往将其集成电路(IC)制造外包给容易发生恶意行为的第三方,例如插入侧道硬件铁马(SCT ) 。 在本文中,我们提出了一个根据工程改变订单(ECO)流程设计和插入SCT的框架,这使得设计公司首次披露如何不费吹灰之力地将一个铁路插入IC。Trojan设计的目的是为每份电源签名读取泄漏多位位位元。我们的调查结果和结果显示,一个铸造厂内的流氓分子如今已经通过ECO进行了所有必要的手段来进行铸造方攻击。