a practical split manufacturing framework for trojan
play

A Practical Split Manufacturing Framework for Trojan Prevention via - PowerPoint PPT Presentation

A Practical Split Manufacturing Framework for Trojan Prevention via Simultaneous Wire Lifting and Cell Insertion Meng Li 1 , Bei Yu 2 , Yibo Lin 1 , Xiaoqing Xu 1 , Wuxi Li 1 , David Z. Pan 1 1 Electrical & Computer Engineering, University of


  1. A Practical Split Manufacturing Framework for Trojan Prevention via Simultaneous Wire Lifting and Cell Insertion Meng Li 1 , Bei Yu 2 , Yibo Lin 1 , Xiaoqing Xu 1 , Wuxi Li 1 , David Z. Pan 1 1 Electrical & Computer Engineering, University of Texas at Austin 2 Computer Science & Engineering, The Chinese University of Hong Kong ASPDAC 2018 - Jan 22, 2017 - Jeju Island, Korea 1 / 20

  2. Motivation State-of-the-Art Framework Experiments Motivation: Hardware Trojan Trojans inserted by untrusted foundries threaten system security ◮ Malicious modifications to the original design ◮ Ultra lightweight but can completely ruin the system security mechanisms Inserted stealthily to prevent post-silicon testing ◮ Require strict conditions to trigger the Trojans primary primary outputs inputs … 2 / 20

  3. Motivation State-of-the-Art Framework Experiments Motivation: Hardware Trojan Trojans inserted by untrusted foundries threaten system security ◮ Malicious modifications to the original design ◮ Ultra lightweight but can completely ruin the system security mechanisms Inserted stealthily to prevent post-silicon testing ◮ Require strict conditions to trigger the Trojans primary primary Cells with rare circuit outputs inputs events are more vulner- … able to Trojan insertion Trigger Payload Trojan Ckt. 2 / 20

  4. Motivation State-of-the-Art Framework Experiments What is Split Manufacturing? Target at preventing Trojan insertion by untrusted foundries ◮ Front-end-of-line (FEOL): cells and wires in lower metal layers, untrusted foundries ◮ Back-end-of-line (BEOL): wires in higher metal layers, trusted foundries Wire connections in BEOL layers are hidden from the attackers ◮ Incur overhead for the wires in the BEOL layers Wire Design House Via BEOL FEOL BEOL Layers Trusted Foundry and Untrusted Foundry Assembler FEOL Assembled Chip Layers 3 / 20

  5. Motivation State-of-the-Art Framework Experiments Why Split Manufacturing Deters Trojan Insertion? Assume attackers have the original netlist and a full control of FEOL ◮ Determine logic signals used to trigger the Trojan based on the original netlist ◮ Determine the target locations to insert Trojans in the FEOL layers Critical nodes can still be protected under such a strong attack model Attacker’s Info 3 C Whether gate B or D in the FEOL layers 4 D implements gate 2 in 1 A the original netlist? 5 E 2 B Original Netlist FEOL C D A E B BEOL 4 / 20

  6. Motivation State-of-the-Art Framework Experiments Previous Split Manufacturing Framework [Imeson+, Usenix’13] Regard FEOL layers and the original netlist as graphs ◮ The FEOL graph must be a subgraph of the original netlist An attacker can identify the physical implementation by subgraph isomorphism relation Orig. Netlist: Subgraph: 5 5 4 2 4 2 Isomorphic Relation: 1 A 3 1 3 1 2 B 3 C FEOL: 4 D E 5 E D B C A 5 / 20

  7. Motivation State-of-the-Art Framework Experiments Previous Split Manufacturing Framework [Imeson+, Usenix’13] Different isomorphism relations lead to multiple possible physical implementations Previous security criterion: k -security ◮ For one cell in the original netlist, require k different possible implementations ◮ For the netlist, require each cell to be at least k secure Orig. Netlist: Subg1: 5 5 4 2 4 2 3 1 1 3 FEOL: 1 A E 2 B 3 C D B 4 D 5 E C A 6 / 20

  8. Motivation State-of-the-Art Framework Experiments Previous Split Manufacturing Framework [Imeson+, Usenix’13] Different isomorphism relations lead to multiple possible physical implementations Previous security criterion: k -security ◮ For one cell in the original netlist, require k different possible implementations ◮ For the netlist, require each cell to be at least k secure Orig. Netlist: Subg1: Subg2: 5 5 5 4 2 4 2 4 2 3 1 1 3 3 1 FEOL: 1 A 1 A E 2 B 2 B 3 C 3 C D B 4 D 4 D 5 E 5 E C A 6 / 20

  9. Motivation State-of-the-Art Framework Experiments Previous Split Manufacturing Framework [Imeson+, Usenix’13] Different isomorphism relations lead to multiple possible physical implementations Previous security criterion: k -security ◮ For one cell in the original netlist, require k different possible implementations ◮ For the netlist, require each cell to be at least k secure Orig. Netlist: Subg1: Subg2: Subg3: 5 5 5 5 4 2 4 2 4 2 2 4 3 1 1 3 3 1 1 3 FEOL: 1 A 1 A 1 A E 2 B 2 B 2 B 3 C 3 C 3 C D B 4 D 4 D 4 D 5 E 5 E 5 E C A 6 / 20

  10. Motivation State-of-the-Art Framework Experiments Previous Split Manufacturing Framework [Imeson+, Usenix’13] Different isomorphism relations lead to multiple possible physical implementations Previous security criterion: k -security ◮ For one cell in the original netlist, require k different possible implementations ◮ For the netlist, require each cell to be at least k secure Orig. Netlist: Subg1: Subg2: Subg3: Subg4: 5 5 5 5 5 4 2 4 2 4 2 2 4 2 4 3 1 1 3 3 1 1 3 3 1 FEOL: 1 A 1 A 1 A 1 A E 2 B 2 B 2 B 2 B 3 C 3 C 3 C 3 C D B 4 D 4 D 4 D 4 D 5 E 5 E 5 E 5 E C A 6 / 20

  11. Motivation State-of-the-Art Framework Experiments Previous Split Manufacturing Framework [Imeson+, Usenix’13] Different isomorphism relations lead to multiple possible physical implementations Previous security criterion: k -security ◮ For one cell in the original netlist, require k different possible implementations ◮ For the netlist, require each cell to be at least k secure Orig. Netlist: 5 4 2 3 1 Nodes 1, 2, 3, 4 are 2-secure. Node 5 is 1-secure. FEOL: The netlist is 1-secure. E D B C A 6 / 20

  12. Motivation State-of-the-Art Framework Experiments Previous Split Manufacturing Framework [Imeson+, Usenix’13] Greedy split manufacturing flow [Imeson+, Usenix’13] ◮ Start by lifting all wires to BEOL layers and add them back iteratively ◮ Greedily select wires with the maximized netlist security Poor scalability due to repetitive subgraph isomorphism checking Original: Starting Point: First Iter: Second Iter: Third Iter: Final FEOL: 1 2 1’ 2’ 1’ 2’ 1’ 2’ 1’ 2’ 1’ 2’ 3 4 3’ 4’ 3’ 4’ 3’ 4’ 3’ 4’ 3’ 4’ 5 6 5’ 6’ 5’ 6’ 5’ 6’ 5’ 6’ 5’ 6’ Sec. lvl = 2 Sec. lvl = 2 Sec. lvl = 2 Sec. lvl = 1 Sec. lvl = 2 … … … 1’ 2’ 1’ 2’ 1’ 2’ Selected Edge 3’ 4’ 3’ 4’ 3’ 4’ Trial Edge 5’ 6’ 5’ 6’ 5’ 6’ Sec. lvl = 1 Sec. lvl = 1 Sec. lvl = 1 7 / 20

  13. Motivation State-of-the-Art Framework Experiments Overview of Our Proposed Solution Besides scalability, [Imeson+, Usenix’13] cannot always achieve required security levels New solution: allowing the dummy node/wire insertion together with wire lifting ◮ Only allow inserting wires pointing to dummy nodes Orig. Netlist: FEOL: Orig. Netlist: FEOL: 5 E 5 E F 4 2 D B 4 2 D B 3 1 C A 3 1 C A However, still need to resolve two new issues ◮ How to define the security criterion since FEOL is not a subgraph of the original netlist ◮ How to enhance the scalability and allow concurrent node/wire insertion 8 / 20

  14. Motivation State-of-the-Art Framework Experiments Generalized Security Criterion Invariant relations between the FEOL layers and the original netlist Relation One Each node in the original netlist has exactly one actual implementation in FEOL For example, one of nodes B and D in FEOL must implement node 2 Orig. Netlist: FEOL: 5 E F 4 2 D B 3 1 C A 9 / 20

  15. Motivation State-of-the-Art Framework Experiments Generalized Security Criterion Invariant relations between the FEOL layers and the original netlist Relation Two If a node in FEOL is the actual physical implementation of a certain node in the original netlist, none of edges pointing to the node can be dummy Recall inserting dummy wires pointing to the actual physical implementation is not allowed For example, if F is the implementation of 5, then ( D , F ) and ( B , F ) are not dummy Orig. Netlist: FEOL: 5 E F 4 2 D B 3 1 C A 9 / 20

  16. Motivation State-of-the-Art Framework Experiments Generalized Security Criterion Now, define new security criterion to accommodate node/wire insertion To identify the possible implementation, build Subgraph Isomorphism Relation between ◮ Spanning subgraph of the original netlist and induced subgraph of FEOL k -security can be defined based on the subgraph isomorphism relation Orig. Netlist: Spanning Subg: 5 5 4 2 4 2 Isomorphic Relation: 1 A 3 1 3 1 2 B 3 C FEOL: Induced Subg: 4 D E F E 5 E F D B D B C A C A 10 / 20

  17. Motivation State-of-the-Art Framework Experiments Sufficient Condition for Security Criterion New security criterion does not help with scalability ◮ Graph isomorphism checking is still required to determine security Sufficient condition based on k -isomorphism [Cheng+, SIGMOD’10]: ◮ A graph composed of k disjoint isomorphic subgraphs is k -isomorphic ◮ A k -isomorphic FEOL graph guarantees k security Avoid isomorphism checking by achieving the sufficient condition Orig. Netlist: FEOL Layers: If A is the candidate B 3 C node of 1, then D 1 5 o 1 i 1 o 1 i 1 A must be the candidate E o 2 4 o 2 D node of 1 as well. 2 i 2 i 2 F 11 / 20

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend