Visible to the public Restricting Switching Activity Using Logic Locking to Improve Power Analysis-Based Trojan Detection

TitleRestricting Switching Activity Using Logic Locking to Improve Power Analysis-Based Trojan Detection
Publication TypeConference Paper
Year of Publication2019
AuthorsNejat, Arash, Kazemi, Zahra, Beroulle, Vincent, Hely, David, Fazeli, Mahdi
Conference Name2019 IEEE 4th International Verification and Security Workshop (IVSW)
ISBN Number978-1-7281-2671-5
Keywordscircuit block extraction, circuit power, composability, cyber physical systems, design for hardware trust, fabrication foundries, gate level, Hardware, hardware security, hardware Trojan detection, hardware Trojan threat, HT activity, HT power, HT-infected circuits, industrial property, integrated circuit layout, intellectual properties, invasive software, IP piracy, IPS, Logic gates, logic locking, logic locking method, malicious circuits, million-gate circuits, outsourcing, PCA-based HT detection methods, policy-based governance, power analysis-based Trojan detection, power consumption, power consumption analysis, Power demand, principal component analysis, Process Variations, pubcrawl, resilience, Resiliency, security, semiconductor companies, small sub-circuit collection, supply chain security, Switches, system-on-chip, trojan horse detection, Trojan horses, untrustworthy fabs
Abstract

Nowadays due to economic reasons most of the semiconductor companies prefer to outsource the manufacturing part of their designs to third fabrication foundries, the so-called fabs. Untrustworthy fabs can extract circuit blocks, the called intellectual properties (IPs), from the layouts and then pirate them. Such fabs are suspected of hardware Trojan (HT) threat in which malicious circuits are added to the layouts for sabotage objectives. HTs lead up to increase power consumption in HT-infected circuits. However, due to process variations, the power of HTs including few gates in million-gate circuits is not detectable in power consumption analysis (PCA). Thus, such circuits should be considered as a collection of small sub-circuits, and PCA must be individually performed for each one of them. In this article, we introduce an approach facilitating PCA-based HT detection methods. Concerning this approach, we propose a new logic locking method and algorithm. Logic locking methods and algorithm are usually employed against IP piracy. They modify circuits such that they do not correctly work without applying a correct key to. Our experiments at the gate level and post-synthesis show that the proposed locking method and algorithm increase the proportion of HT activity and consequently HT power to circuit power.

URLhttps://ieeexplore.ieee.org/document/8854402
DOI10.1109/IVSW.2019.8854402
Citation Keynejat_restricting_2019