Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/2744769.2747939acmconferencesArticle/Chapter ViewAbstractPublication PagesdacConference Proceedingsconference-collections
research-article

Pre-silicon security verification and validation: a formal perspective

Published: 07 June 2015 Publication History

Abstract

Reusable hardware Intellectual Property (IP) based System-on-Chip (SoC) design has emerged as a pervasive design practice in the industry today. The possibility of hardware Trojans and/or design backdoors hiding in the IP cores has raised security concerns. As existing functional testing methods fall short in detecting unspecified (often malicious) logic, formal methods have emerged as an alternative for validation of trustworthiness of IP cores. Toward this direction, we discuss two main categories of formal methods used in hardware trust evaluation: theorem proving and equivalence checking. Specifically, proof-carrying hardware (PCH) and its applications are introduced in detail, in which we demonstrate the use of theorem proving methods for providing high-level protection of IP cores. We also outline the use of symbolic algebra in equivalence checking, to ensure that the hardware implementation is equivalent to its design specification, thus leaving little space for malicious logic insertion.

References

[1]
D. Agrawal, S. Baktir, D. Karakoyunlu, P. Rohatgi, and B. Sunar. Trojan detection using IC fingerprinting. In IEEE Symposium on Security and Privacy, pages 296--310, 2007.
[2]
M. Banga and M. Hsiao. Trusted RTL: Trojan detection methodology in pre-silicon designs. In IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), pages 56--59, 2010.
[3]
E. Biham, Y. Carmeli, and A. Shamir. Bug attacks. Advances in Cryptology, page 221--240, 2008.
[4]
B. Buchberger. Ein algorithmus zum auffinden der basiselemente des restklassenringes nach einem nulldimensionalen polynomideal. University of Innsbruck, 1965.
[5]
B. Buchberger. A criterion for detecting unnecessary reductions in the construction of a groebner bases. In EUROSAM, 1979.
[6]
R. Chakraborty, F. Wolff, S. Paul, C. Papachristou, and S. Bhunia. MERO: A statistical approach for hardware Trojan detection. In Cryptographic Hardware and Embedded Systems, pages 396--410, 2009.
[7]
D. Cox, J. little, and D. O'shea. Ideal, varieties and algorithm: An introduction to computational algebraic geometry and commutative algebra. In Springer, 2007.
[8]
J. Da Rolt, G. Di Natale, M. L. Flottes, and B. Rouzeyre. Are advanced dft structures sufficient for preventing scan-attacks? In VLSI Test Symposium (VTS), pages 246--251, 2012.
[9]
S. Drzevitzky. Proof-carrying hardware: Runtime formal verification for secure dynamic reconfiguration. In International Conference on Field Programmable Logic and Applications, pages 255--258, 2010.
[10]
S. Drzevitzky, U. Kastens, and M. Platzner. Proof-carrying hardware: Towards runtime verification of reconfigurable modules. In ReConFig, pages 189--194, 2009.
[11]
S. Drzevitzky, U. Kastens, and M. Platzner. Proof-carrying hardware: Concept and prototype tool flow for online verification. International Journal of Reconfigurable Computing, vol. 2010, 2010.
[12]
S. Drzevitzky and M. Platzner. Achieving hardware security for reconfigurable systems on chip by a proof-carrying code approach. In 6th International Workshop on Reconfigurable Communication-centric Systems-on-Chip, pages 1--8, 2011.
[13]
F. Farahmandi and B. Alizadeh. Groebner basis based formal verification of large arithmetic circuits using gaussian elimination and cone-based polynomial extraction. In Microprocessors and Microsystems - Embedded Hardware Design, pages 83--96, 2015.
[14]
F. Farahmandi, B. Alizadeh, and Z. Navabi. Effective combination of algebraic techniques and decision diagrams to formally verify large arithmetic circuits. In IEEE Computer Society Annual Symposium on VLSI (ISVLSI), pages 338--343, 2014.
[15]
P. G. S. Greuel, G.-M. 2012. SINGULAR 3.1.3 A Computer Algebra System for Polynomial Computations. Centre for Computer Algebra. http://www.singular.uni-kl.de.
[16]
M. Hicks, M. Finnicum, S. T. King, M. M. K. Martin, and J. M. Smith. Overcoming an untrusted computing base: Detecting and removing malicious hardware automatically. In Proceedings of IEEE Symposium on Security and Privacy, pages 159--172, 2010.
[17]
INRIA. The coq proof assistant, 2010. http://coq.inria.fr/.
[18]
Y. Jin. Design-for-security vs. design-for-testability: A case study on dft chain in cryptographic circuits. In IEEE Computer Society Annual Symposium on VLSI (ISVLSI), 2014.
[19]
Y. Jin and Y. Makris. Hardware Trojan detection using path delay fingerprint. In IEEE International Workshop on Hardware-Oriented Security and Trust, pages 51--57, 2008.
[20]
Y. Jin and Y. Makris. Proof carrying-based information flow tracking for data secrecy protection and hardware trust. In VLSI Test Symposium (VTS), pages 252--257, 2012.
[21]
Y. Jin, B. Yang, and Y. Makris. Cycle-accurate information assurance by proof-carrying based signal sensitivity tracing. In IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), pages 99--106, 2013.
[22]
C. Koc and T. Acar. Montgomery multiplication in GF (2k). In Designs, Codes and Cryptography, volume 14, pages 57--69, 1998.
[23]
C. Lamech, R. Rad, M. Tehranipoor, and J. Plusquellic. An experimental analysis of power and delay signal-to-noise requirements for detecting Trojans and methods for achieving the required detection sensitivities. IEEE Trans. on Information Forensics and Security, 6(3):1170--1179, 2011.
[24]
E. Love, Y. Jin, and Y. Makris. Enhancing security via provably trustworthy hardware intellectual property. In Hardware-Oriented Security and Trust (HOST), 2011 IEEE International Symposium on, pages 12--17, 2011.
[25]
E. Love, Y. Jin, and Y. Makris. Proof-carrying hardware intellectual property: A pathway to trusted module acquisition. IEEE Transactions on Information Forensics and Security, 7(1):25--40, 2012.
[26]
J. Lv, P. Kalla, and F. Enescu. Efficient groebner basis reductions for formal verification of galois field multipliers. In Proceedings Design, Automation and Test in Europe Conf. (DATE), pages 899--904, 2012.
[27]
J. Lv, P. Kalla, and F. Enescu. Efficient groebner basis reductions for formal verification of galois field arithmetic circuits. In IEEE Transactions on CAD (TCAD), volume 32, pages 1409--1420, 2013.
[28]
a. J. F. M. Knežević, and K. Sakiyama and I. Verbauwhed. Modular reduction in GF (2n) without pre-computational phase. In Proceedings of the International Workshop on Arithmetic of Finite Fields, pages 77--87, 2008.
[29]
R. Nara, N. Togawa, M. Yanagisawa, and T. Ohtsuki. Scan-based attack against elliptic curve cryptosystems. In Proceedings of the 2010 Asia and South Pacific Design Automation Conference, pages 407--412, 2010.
[30]
G. C. Necula. Proof-carrying code. In POPL '97: Proceedings of the 24th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, pages 106--119, 1997.
[31]
R. Rad, J. Plusquellic, and M. Tehranipoor. Sensitivity analysis to hardware Trojans using power supply transient signals. In HOST, pages 3--7, 2008.
[32]
R. M. Rad, X. Wang, M. Tehranipoor, and J. Plusquellic. Power supply signal calibration techniques for improving detection resolution to hardware Trojans. In ICCAD, pages 632--639, 2008.
[33]
J. Rolt, A. Das, G. Natale, M.-L. Flottes, B. Rouzeyre, and I. Verbauwhede. A new scan attack on rsa in presence of industrial countermeasures. In W. Schindler and S. Huss, editors, Constructive Side-Channel Analysis and Secure Design, volume 7275 of Lecture Notes in Computer Science, pages 89--104. Springer Berlin Heidelberg, 2012.
[34]
G. Sengar, D. Mukhopadhyay, and D. Chowdhury. Secured flipped scan-chain model for crypto-architecture. Computer-Aided Design of Integrated Circuits and Systems, IEEE Transactions on, 26(11):2080--2084, 2007.
[35]
C. Sturton, M. Hicks, D. Wagner, and S. King. Defeating UCI: Building stealthy and malicious hardware. In 2011 IEEE Symposium on Security and Privacy (SP), pages 64--77, 2011.
[36]
F. Wolff, C. Papachristou, S. Bhunia, and R. S. Chakraborty. Towards Trojan-free trusted ICs: Problem analysis and detection scheme. In DATE, pages 1362--1365, 2008.
[37]
B. Yang, K. Wu, and R. Karri. Scan based side channel attack on dedicated hardware implementations of data encryption standard. In ITC, pages 339--344, 2004.
[38]
B. Yang, K. Wu, and R. Karri. Secure scan: A design-for-test architecture for crypto chips. IEEE Transactions on CAD, 25(10):2287--2293, 2006.
[39]
X. Zhang and M. Tehranipoor. Case study: Detecting hardware trojans in third-party digital ip cores. In HOST, pages 67--70, 2011.

Cited By

View all
  • (2025)DEFending Integrated Circuit LayoutsIEEE Transactions on Information Forensics and Security10.1109/TIFS.2024.349281020(46-59)Online publication date: 2025
  • (2024)A Survey of High-Level Synthesis-Based Hardware (IP) Watermarking ApproachesIEEE Design & Test10.1109/MDAT.2024.343505641:6(70-83)Online publication date: Dec-2024
  • (2024)CA4TJ: Correlational Analysis for Always-On Information-Leakage Hardware Trojan Detecting2024 IEEE International Test Conference in Asia (ITC-Asia)10.1109/ITC-Asia62534.2024.10661328(1-6)Online publication date: 18-Aug-2024
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
DAC '15: Proceedings of the 52nd Annual Design Automation Conference
June 2015
1204 pages
ISBN:9781450335201
DOI:10.1145/2744769
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 07 June 2015

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Research-article

Funding Sources

Conference

DAC '15
Sponsor:
DAC '15: The 52nd Annual Design Automation Conference 2015
June 7 - 11, 2015
California, San Francisco

Acceptance Rates

Overall Acceptance Rate 1,770 of 5,499 submissions, 32%

Upcoming Conference

DAC '25
62nd ACM/IEEE Design Automation Conference
June 22 - 26, 2025
San Francisco , CA , USA

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)68
  • Downloads (Last 6 weeks)7
Reflects downloads up to 16 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2025)DEFending Integrated Circuit LayoutsIEEE Transactions on Information Forensics and Security10.1109/TIFS.2024.349281020(46-59)Online publication date: 2025
  • (2024)A Survey of High-Level Synthesis-Based Hardware (IP) Watermarking ApproachesIEEE Design & Test10.1109/MDAT.2024.343505641:6(70-83)Online publication date: Dec-2024
  • (2024)CA4TJ: Correlational Analysis for Always-On Information-Leakage Hardware Trojan Detecting2024 IEEE International Test Conference in Asia (ITC-Asia)10.1109/ITC-Asia62534.2024.10661328(1-6)Online publication date: 18-Aug-2024
  • (2024)Trustworthy Integrated Circuits: From Safety to Security and BeyondIEEE Access10.1109/ACCESS.2024.340068512(69603-69632)Online publication date: 2024
  • (2024)Hardware Trojans Detection and Prevention Techniques ReviewWireless Personal Communications10.1007/s11277-024-11334-6136:2(1147-1182)Online publication date: 25-Jun-2024
  • (2024)Non-Invasive Hardware Trojans Modeling and Insertion: A Formal Verification ApproachJournal of Electronic Testing10.1007/s10836-024-06100-240:1(117-135)Online publication date: 20-Mar-2024
  • (2023)MorFuzzProceedings of the 32nd USENIX Conference on Security Symposium10.5555/3620237.3620311(1307-1324)Online publication date: 9-Aug-2023
  • (2023)A unioned graph neural network based hardware Trojan node detectionIEICE Electronics Express10.1587/elex.20.2023020420:13(20230204-20230204)Online publication date: 10-Jul-2023
  • (2023)Hardware IP Assurance against Trojan Attacks with Machine Learning and Post-processingACM Journal on Emerging Technologies in Computing Systems10.1145/359279519:3(1-23)Online publication date: 21-Jun-2023
  • (2023)Systematic Trojan Detection in Crypto-Systems Using the Model CheckerJournal of Circuits, Systems and Computers10.1142/S021812662450045233:03Online publication date: 5-Oct-2023
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media