Tracking Data Flow at Gate-Level Through Structural Checking
Title | Tracking Data Flow at Gate-Level Through Structural Checking |
Publication Type | Conference Paper |
Year of Publication | 2016 |
Authors | Le, Thao, Di, Jia, Tehranipoor, Mark, Forte, Domenic, Wang, Lei |
Conference Name | Proceedings of the 26th Edition on Great Lakes Symposium on VLSI |
Date Published | May 2016 |
Publisher | ACM |
Conference Location | New York, NY, USA |
ISBN Number | 978-1-4503-4274-2 |
Keywords | asset, Chained Attacks, composability, data flow tracking, hardware security, pubcrawl, Resiliency, structural checking, Trojan detection, trojan horse detection |
Abstract | The rapid growth of Internet-of-things and other electronic devices make a huge impact on how and where data travel. The confidential data (e.g., personal data, financial information) that travel through unreliable channels can be exposed to attackers. In hardware, the confidential data such as secret cipher keys are facing the same issue. This problem is even more serious when the IP is from a 3rd party and contains scan-chains. Thus, data flow tracking is important to analyze possible leakage channels in fighting against such hardware security threats. This paper introduces a method for tracking data flow and detecting potential hardware Trojans in gate-level soft IPs using assets and Structural Checking tool. |
URL | https://dl.acm.org/doi/10.1145/2902961.2903040 |
DOI | 10.1145/2902961.2903040 |
Citation Key | le_tracking_2016 |