Visible to the public Private Circuits III: Hardware Trojan-Resilience via Testing Amplification

TitlePrivate Circuits III: Hardware Trojan-Resilience via Testing Amplification
Publication TypeConference Paper
Year of Publication2016
AuthorsDziembowski, Stefan, Faust, Sebastian, Standaert, François-Xavier
Conference NameProceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security
PublisherACM
Conference LocationNew York, NY, USA
ISBN Number978-1-4503-4139-4
KeywordsComputing Theory, control theory, countermeasures against malicious hardware manufacturers, Formal Security Models, Hardware Trojans, pubcrawl, resilience, Resiliency
Abstract

Security against hardware trojans is currently becoming an essential ingredient to ensure trust in information systems. A variety of solutions have been introduced to reach this goal, ranging from reactive (i.e., detection-based) to preventive (i.e., trying to make the insertion of a trojan more difficult for the adversary). In this paper, we show how testing (which is a typical detection tool) can be used to state concrete security guarantees for preventive approaches to trojan-resilience. For this purpose, we build on and formalize two important previous works which introduced ``input scrambling" and ``split manufacturing" as countermeasures to hardware trojans. Using these ingredients, we present a generic compiler that can transform any circuit into a trojan-resilient one, for which we can state quantitative security guarantees on the number of correct executions of the circuit thanks to a new tool denoted as ``testing amplification". Compared to previous works, our threat model covers an extended range of hardware trojans while we stick with the goal of minimizing the number of honest elements in our transformed circuits. Since transformed circuits essentially correspond to redundant multiparty computations of the target functionality, they also allow reasonably efficient implementations, which can be further optimized if specialized to certain cryptographic primitives and security goals.

URLhttp://doi.acm.org/10.1145/2976749.2978419
DOI10.1145/2976749.2978419
Citation Keydziembowski_private_2016