Difference between revisions of "Nelson2009"
From ACES
(Import from BibTeX) |
m (Default pdf) |
||
(One intermediate revision by the same user not shown) | |||
Line 3: | Line 3: | ||
|abstract=Ghost circuitry (GC) insertion is the malicious addition of hardware in the specification and/or implementation of an IC by an attacker intending to change circuit functionality. There are numerous GC insertion sources, including untrusted foundries, synthesis tools and libraries, testing and verification tools, and configuration scripts. Moreover, GC attacks can greatly compromise the security and privacy of hardware users, either directly or through interaction with pertinent systems, application software, or with data. GC detection is a particularly difficult task in modern and pending deep submicron technologies due to intrinsic manufacturing variability. Here, we provide algebraic and statistical approaches for the detection of ghost circuitry. A singular value decomposition (SVD)-based technique for gate characteristic recovery is applied to solve a system of equations created using fast and non-destructive measurements of leakage power and/or delay. This is then combined with statistical constraint manipulation techniques to detect embedded ghost circuitry. The effectiveness of the approach is demonstrated on the ISCAS 85 benchmarks. | |abstract=Ghost circuitry (GC) insertion is the malicious addition of hardware in the specification and/or implementation of an IC by an attacker intending to change circuit functionality. There are numerous GC insertion sources, including untrusted foundries, synthesis tools and libraries, testing and verification tools, and configuration scripts. Moreover, GC attacks can greatly compromise the security and privacy of hardware users, either directly or through interaction with pertinent systems, application software, or with data. GC detection is a particularly difficult task in modern and pending deep submicron technologies due to intrinsic manufacturing variability. Here, we provide algebraic and statistical approaches for the detection of ghost circuitry. A singular value decomposition (SVD)-based technique for gate characteristic recovery is applied to solve a system of equations created using fast and non-destructive measurements of leakage power and/or delay. This is then combined with statistical constraint manipulation techniques to detect embedded ghost circuitry. The effectiveness of the approach is demonstrated on the ISCAS 85 benchmarks. | ||
|pages=221 - 234 | |pages=221 - 234 | ||
|month= | |||
|year=2009 | |||
|booktitle=Information Hiding (IH) | |booktitle=Information Hiding (IH) | ||
|title=SVD-Based Ghost Circuitry Detection | |title=SVD-Based Ghost Circuitry Detection | ||
|entry=inproceedings | |entry=inproceedings | ||
| | |pdf=Nelson2009.pdf | ||
}} | }} |
Latest revision as of 17:38, 9 November 2021
Nelson2009 | |
---|---|
entry | inproceedings |
address | |
annote | |
author | M. Nelson and A. Nahapetian and F. Koushanfar and M. Potkonjak |
booktitle | Information Hiding (IH) |
chapter | |
edition | |
editor | |
howpublished | |
institution | |
journal | |
month | |
note | |
number | |
organization | |
pages | 221 - 234 |
publisher | |
school | |
series | |
title | SVD-Based Ghost Circuitry Detection |
type | |
volume | |
year | 2009 |
doi | |
issn | |
isbn | |
url | |
Nelson2009.pdf |