2020 IEEE Symposium on Security and Privacy (SP) 2020
DOI: 10.1109/sp40000.2020.00083
|View full text |Cite
|
Sign up to set email alerts
|

ICAS: an Extensible Framework for Estimating the Susceptibility of IC Layouts to Additive Trojans

Abstract: The transistors used to construct Integrated Circuits (ICs) continue to shrink. While this shrinkage improves performance and density, it also reduces trust: the price to build leading-edge fabrication facilities has skyrocketed, forcing even nation states to outsource the fabrication of high-performance ICs. Outsourcing fabrication presents a security threat because the black-box nature of a fabricated IC makes comprehensive inspection infeasible. Since prior work shows the feasibility of fabrication-time att… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
1
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 16 publications
(16 citation statements)
references
References 37 publications
0
1
0
Order By: Relevance
“…1, this type of insertion would be feasible for an adversary that is involved in the integration process (i.e., we act as attacker A2). It is also conceivable that an adversary in the manufacture process could perform the ransomware insertion, but certainly the challenge would be much higher for this adversary as he/she has to find enough gaps in the placement to insert his malicious logic and then find enough routing resources to connect the inserted cells [31]. We will also show how this type of fabrication-time attack is possible (i.e., we act as attacker A3).…”
Section: Case Study: Common Evaluation Platformmentioning
confidence: 97%
“…1, this type of insertion would be feasible for an adversary that is involved in the integration process (i.e., we act as attacker A2). It is also conceivable that an adversary in the manufacture process could perform the ransomware insertion, but certainly the challenge would be much higher for this adversary as he/she has to find enough gaps in the placement to insert his malicious logic and then find enough routing resources to connect the inserted cells [31]. We will also show how this type of fabrication-time attack is possible (i.e., we act as attacker A3).…”
Section: Case Study: Common Evaluation Platformmentioning
confidence: 97%
“…Lastly, the IC is fabricated, and packaged into a device for mounting on a printed circuit board. In line with prior work on untrusted foundry [3,4,8,28,34,54,64,65], and economic forces, we assume all design phases-except fabrication-are trusted. Defensive Routing is deployed at the physical level, i.e., the PaR design phase.…”
Section: Background 21 Ic Design Processmentioning
confidence: 99%
“…A hardware Trojan is a malicious modification to a circuit designed to alter its operative functionality [7]. It consists of two main building blocks: a trigger and payload [12,24,54,62]. Prior work provides hardware Trojan taxonomies based on the type of trigger and payload designs they employ [12,24,54,55,62].…”
Section: Hardware Trojansmentioning
confidence: 99%
See 2 more Smart Citations