Visible to the public Tracking Data Flow at Gate-Level Through Structural Checking

TitleTracking Data Flow at Gate-Level Through Structural Checking
Publication TypeConference Paper
Year of Publication2016
AuthorsLe, Thao, Di, Jia, Tehranipoor, Mark, Forte, Domenic, Wang, Lei
Conference NameProceedings of the 26th Edition on Great Lakes Symposium on VLSI
Date PublishedMay 2016
PublisherACM
Conference LocationNew York, NY, USA
ISBN Number978-1-4503-4274-2
Keywordsasset, Chained Attacks, composability, data flow tracking, hardware security, pubcrawl, Resiliency, structural checking, Trojan detection, trojan horse detection
Abstract

The rapid growth of Internet-of-things and other electronic devices make a huge impact on how and where data travel. The confidential data (e.g., personal data, financial information) that travel through unreliable channels can be exposed to attackers. In hardware, the confidential data such as secret cipher keys are facing the same issue. This problem is even more serious when the IP is from a 3rd party and contains scan-chains. Thus, data flow tracking is important to analyze possible leakage channels in fighting against such hardware security threats. This paper introduces a method for tracking data flow and detecting potential hardware Trojans in gate-level soft IPs using assets and Structural Checking tool.

URLhttps://dl.acm.org/doi/10.1145/2902961.2903040
DOI10.1145/2902961.2903040
Citation Keyle_tracking_2016