Designers use third-party intellectual property (IP) cores and outsource various steps in the integrated circuit (IC) design and manufacturing flow. As a result, security vulnerabilities have been rising. This is forcing IC designers and end users to re-evaluate their trust in ICs. If attackers get hold of an unprotected IC, they can reverse engineer the IC and pirate the IP. Similarly, if attackers get hold of a design, they can insert malicious circuits or take advantage of "backdoors" in a design. Unintended design bugs can also result in security weaknesses. This tutorial paper provides an introduction to the domain of hardware security through two pedagogical examples of hardware security problems. The first is a walk-through of the scan chain-based side channel attack. The second is a walk-through of logic locking of digital designs. The tutorial material is accompanied by open access digital resources that are linked in this article.
翻译:设计者使用第三方知识产权核心,并在集成电路设计和制造流程中将各种步骤外包出去。因此,安全脆弱性不断上升。这迫使IC公司设计者和终端用户重新评价他们对IC公司的信任。如果攻击者得到无保护的IC公司,他们可以倒转IC公司,盗用IP公司。同样,如果攻击者得到设计,他们可以插入恶意电路,或者在设计中利用“后门”。无意的设计错误也可能导致安全缺陷。这份指导性文件通过硬件安全问题的两个教学实例,介绍了硬件安全领域。第一个是扫描链基侧通道攻击的步行。第二个是数字设计逻辑锁定的通路。辅助材料配有与本条相关的公开访问数字资源。