Consumer and defense systems demanded design and manufacturing of electronics with increased performance, compared to their predecessors. As such systems became ubiquitous in a plethora of domains, their application surface increased, thus making them a target for adversaries. Hence, with improved performance the aspect of security demanded even more attention of the designers. The research community is rife with extensive details of attacks that target the confidential design details by exploiting vulnerabilities. The adversary could target the physical design of a semiconductor chip or break a cryptographic algorithm by extracting the secret keys, using attacks that will be discussed in this thesis. This thesis focuses on presenting a brief overview of IC reverse engineering attack and attacks targeting cryptographic systems. Further, the thesis presents my contributions to the defenses for the discussed attacks. The globalization of the Integrated Circuit (IC) supply chain has rendered the advantage of low-cost and high-performance ICs in the market for the end users. But this has also made the design vulnerable to over production, IP Piracy, reverse engineering attacks and hardware malware during the manufacturing and post manufacturing process. Logic locking schemes have been proposed in the past to overcome the design trust issues but the new state-of-the-art attacks such as SAT has proven a larger threat. This work highlights the reverse engineering attack and a proposed hardened platform along with its framework.
翻译:与先前的系统相比,消费者和国防系统要求设计和制造具有更高性能的电子设备。随着这些系统在众多领域变得无处不在,其应用面面也增加,因此成为对手的目标。因此,随着安全方面的性能提高,要求设计者更加注意安全方面。研究界充斥着针对机密设计细节的攻击的广泛细节,利用脆弱性来开发机密设计细节。对手可以通过提取秘密钥匙来瞄准半导体芯片的物理设计或打破加密算法,使用本论文中将讨论的攻击。本论文的重点是简要概述IC反向工程攻击和针对加密系统的攻击。此外,该论文介绍了我对所讨论攻击的防御工作的贡献。综合电路(IC)供应链的全球化为终端用户提供了市场低成本和高性能IC的优势。但是这也使得设计易受到过度生产、IP盗版、反向工程攻击和硬件恶意软件的算法,在制造和后期中将讨论。逻辑锁定计划是简要地概述IC的系统,过去在更大的威胁性设计平台上提出了一个硬性攻击计划,克服了这一威胁性攻击。