CAD for Assurance of Electronic Systems
 

IP Trojan Attacks

Description

The current economic trend and reduced time to market have forced the integrated circuit (IC) design and manufacturing houses to rely on untrusted parties in the IC life cycle. Today’s system on chip (SoC) designs use intellectual property (IP) cores from trusted and untrusted third-party (3PIP) vendors. As such, ensuring the trustworthiness of untrusted 3PIP’s have become essential for the security and safety of devices and printed circuit boards (PCBs) that use the SoCs. Trojans can be inserted into soft or hard IP cores by rogue designers or by an untrusted CAD tool in an IP design house. Such a trojan can go undetected during the post-fabrication testing and validation stages of the SoC and can be triggered during the operation of the device or the PCB. Defenses against malicious 3PIP include self-monitoring, static/dynamic testing, and static formal verification such as Formal-PCH, VIPR, and TRIT-PCB. Trojans can also be prevented from activation in the SoC by breaking the sequence/timing of events and by scrambling inputs supplied to the 3PIPs.

Related Tools

Publications

Hoque, Tamzidul; Yang, Shuo; Bhattacharyay, Aritra; Cruz, Jonathan; Bhunia, Swarup

An Automated Framework for Board-level Trojan Benchmarking Miscellaneous

2020.

Abstract | Links | BibTeX

Facon, Adrien; Guilley, Sylvain; Lec'hvien, Matthieu; Marion, Damien; Perianin, Thomas

Binary Data Analysis for Source Code Leakage Assessment Proceedings Article

In: Innovative Security Solutions for Information Technology and Communications, pp. 391–409, Springer International Publishing, Cham, 2019, ISBN: 978-3-030-12942-2.

Abstract | Links | BibTeX

Souissi, Youssef; Facon, Adrien; Guilley, Sylvain

Virtual Security Evaluation Proceedings Article

In: Carlet, Claude; Guilley, Sylvain; Nitaj, Abderrahmane; Souidi, El Mamoun (Ed.): Codes, Cryptology and Information Security, pp. 3–12, Springer International Publishing, Cham, 2019, ISBN: 978-3-030-16458-4.

Abstract | Links | BibTeX

Hoque, Tamzidul; Cruz, Jonathan; Chakraborty, Prabuddha; Bhunia, Swarup

Hardware IP Trust Validation: Learn (the Untrustworthy), and Verify Proceedings Article

In: International Test Conference (ITC), ITC IEEE, 2018, ISBN: 978-1-5386-8382-8.

Abstract | Links | BibTeX

Takarabt, Sofiane; Chibani, Kais; Facon, Adrien; Guilley, Sylvain; Mathieu, Yves; Sauvage, Laurent; Souissi, Youssef

Pre-silicon Embedded System Evaluation as New EDA Tool for Security Verification Proceedings Article

In: 2018 IEEE 3rd International Verification and Security Workshop (IVSW), pp. 74-79, 2018.

Abstract | Links | BibTeX

Guo, Xiaolong; Dutta, Raj Gautam; He, Jiaji; Jin, Yier

PCH framework for IP runtime security verification Proceedings Article

In: 2017 Asian Hardware Oriented Security and Trust Symposium (AsianHOST), pp. 79-84, IEEE, 2017.

Abstract | Links | BibTeX

Guo, Xiaolong; Dutta, Raj Gautam; Mishra, Prabhat; Jin, Yier

Automatic Code Converter Enhanced PCH Framework for SoC Trust Verification Journal Article

In: IEEE Transactions on Very Large Scale Integration (VLSI) Systems, vol. 25, no. 12, pp. 3390-3400, 2017.

Abstract | Links | BibTeX

Guo, Xiaolong; Dutta, Raj Gautam; Mishra, Prabhat; Jin, Yier

Scalable SoC trust verification using integrated theorem proving and model checking Proceedings Article

In: 2016 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), pp. 124-129, HOST IEEE, McLean, VA, USA , 2016.

Abstract | Links | BibTeX

Guo, Xiaolong; Dutta, Raj Gautam; Jin, Yier

Eliminating the Hardware-Software Boundary: A Proof-Carrying Approach for Trust Evaluation on Computer Systems Journal Article

In: IEEE Transactions on Information Forensics and Security (TIFS), vol. 12, no. 2, pp. 405-417, 2016.

Abstract | Links | BibTeX