Hardware Trojan (HT) Detection in 3

Download Report

Transcript Hardware Trojan (HT) Detection in 3

Hardware Trojan (HT)
Detection in 3-D IC
Wafi Danesh
Instructor: Dr. Christopher Allen
EECS 713 High-Speed Digital Circuit Design
Final Project Presentation
1
Outline
Why is Hardware Trojan (HT) a major
concern ?
Hardware Trojan (HT) Classification
and Detection
Introduction to 3-D IC
HT Detection in 3-D IC
2
Outline
Why is Hardware Trojan (HT) a major
concern ?
Hardware Trojan (HT) Classification
and Detection
Introduction to 3-D IC
HT Detection in 3-D IC
3
Outsourcing Chip Manufacturing
 Modern fabrication facility is costly
• $4.6 billion, Global Foundries, Fab 8, 2012[1]
• $7 billion, Intel, upgrading 7 facilities, 2009[2]
 Outsourcing fabrication is preferred
[1] www.theguardian.com
[2] www.forwardthinking.pcmag.com
https://www.ventureoutsource.com
4
Security Challenge from
Outsourcing
Outsourcing brings in
potential chip safety issues
Each stage designated to
different companies
•
•
•
make malicious insertions
insert counterfeit parts
modify design specification
Real-life reports:
• Counterfeit part reports increased
by factor of 700, iSupply report
Feb. 24, 2012.
• 1800 cases of counterfeit parts
over 2 year survey, Congressional
hearing Nov. 8, 2011.
Supply chain
Source: http://chipsecurity.org
5
Outline
Why is Hardware Trojan (HT) a major
concern ?
Hardware Trojan (HT) Classification
and Detection
Introduction to 3-D IC
HT Detection in 3-D IC
6
HT Definition
• Extra circuitry added to specified design
• can cause malfunction
• steal secret information
• create backdoor for attack
• Architecture divided into two parts:
• Trigger, activates the HT
• Payload, delivers the malicious effect
7
HT Classification
M. Tehranipoor and F. Koushanfar, IEEE Design & Test of Computers, 2010
8
Example of HT Effect
Combinational triggered HT
Original output
10
1
Triggered
0 1
Modified
output
1 0
XOR gate (Payload)
1
0
AND gate (trigger)
9
Example of HT Effect (continued)
Sequential triggered HT
2400
bits/second
Trigger probability = 1/2^32
Time to trigger = 662.8 days
32-bit trigger
Hardware
Trojan
RS-232 transmitter
module
10
HT Detection
J. Francq and F. Frick, ECCTD, 2015
11
Outline
Why is Hardware Trojan (HT) a major
concern ?
Hardware Trojan (HT) Classification
and Detection
Introduction to 3-D IC
HT Detection in 3-D IC
12
What is a 3D IC?
Chip consisting of multiple “tiers” of thinned-active
2D ICs
“Tiers” are layers that are stacked, bonded, and
electrically connected
Connection made using “Through-Silicon-Vias
(TSVs)” or “posts”
Frequency of connections is user-defined and
application specific
13
Generic architecture of 3D IC
Development process of a 3-D IC
Example of a fabricated 3-D IC, a
ring oscillator circuit
Three Dimensional System Integration, A Papanikolaou, 2010
14
Benefits and Drawbacks
Advantages of 3D IC for HT detection:
Heterogeneous Integration
Small form factor
Reduced power consumption
Decrease in overall cost of fabrication
Disadvantages:
Additional process steps for TSV
Higher operating temperature
Mechanical stability
Vendor interfaces
Standardization
15
Outline
Why is Hardware Trojan (HT) a major
concern ?
Hardware Trojan (HT) Classification
and Detection
Introduction to 3-D IC
HT Detection in 3-D IC
16
HT Detection Methods in 3-D IC
Heterogeneous mix of ICs stacked vertically in
standard 3-D IC die
Each IC can be fabricated from a different vendor
The process is a type of “Split Manufacture”
Aim is to prevent attacker from having a complete
picture of IC design
Critical functionality fabricated by a trusted foundry
while less “security intensive” functionality shipped
out to untrusted foundry
17
Integration of 3-D Control Plane
Initial proposed method:
Computation plane shipped to
untrusted foundry whereas 3-D
control plane fabricated in trusted
foundry
“Posts” tap required signals needed
for security logic
“Sleep
transistors”
reroute,
override, or disable lines on the
computation plane.
Computation plane thus monitored
from 3-D computation plane
J. Valamehr et. al, ACSAC, 2010
18
Hardware Obfuscation
Aim is to obscure the connections in the
IC netlist to the attacker:
Fabrication divided into two tiers:
bottom tier, fabricated by untrusted
foundry and top tier, fabricated by
trusted foundry
Neltist is split among the two tiers
Attacker has access to the bottom tier
The attack has to be random as gates
in bottom tier are indistinguishable
Attack will also require larger
overhead of HT risking detection
F. Imeson et. al, USENIX, 2013
19
Hardware Obfuscation Example
Example is of Virtex-7 2000T
Bottom tier, contains active
CMOS transistors, expensive to
fabricate and outsourced
Upper tier, called “interposer”, has
additional connections for digital
logic gates on the bottom tier
F. Imeson et. al, USENIX, 2013
20
Security-Aware 2.5D IC Design
Original netlist
partitions:
split
into
3
2 sub-netlists detailing the logic
gates involved in the IC functionality
Interposer layer containing all
connections in the netlists
Attacker cannot determine the
success of attack due to
obfuscation
Layout is also obfuscated in order
to deter layout based attacks
Y. Xie et. al, ACM, 2015
21
THANK YOU!!!
QUESTIONS?
22
References
1. Tehranipoor, Mohammad, and Farinaz Koushanfar. "A survey of hardware Trojan
taxonomy and detection." (2010).
2. Francq, Julien, and Florian Frick. "Overview of hardware trojan detection and
prevention methods." Circuit Theory and Design (ECCTD), 2015 European
Conference on. IEEE, 2015.
3. Papanikolaou, Antonis, Dimitrios Soudris, and Riko Radojcic. Three dimensional
system integration: IC stacking process and design. Springer Science & Business
Media, 2010.
4. Valamehr, Jonathan, et al. "Hardware assistance for trustworthy systems
through 3-D integration." Proceedings of the 26th Annual Computer Security
Applications Conference. ACM, 2010.
5. Imeson, Frank, et al. "Securing Computer Hardware Using 3D Integrated Circuit
(IC) Technology and Split Manufacturing for Obfuscation." USENIX Security. Vol.
13. 2013.
23
References
6. Xie, Yang, Chongxi Bao, and Ankur Srivastava. "Security-Aware Design Flow for
2.5 D IC Technology." Proceedings of the 5th International Workshop on Trustworthy
Embedded Devices. ACM, 2015.
24