2013 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST) 2013
DOI: 10.1109/hst.2013.6581568
|View full text |Cite
|
Sign up to set email alerts
|

WordRev: Finding word-level structures in a sea of bit-level gates

Abstract: Abstract-Systems are increasingly being constructed from offthe-shelf components acquired through a globally distributed and untrusted supply chain. Often only post-synthesis gate-level netlists or actual silicons are available for security inspection. This makes reasoning about hardware trojans particularly challenging given the enormous scale of the problem. Currently, there is no mature methodology that can provide visibility into a bitlevel design in terms of high-level components to allow more comprehensi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
37
0

Year Published

2013
2013
2021
2021

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 68 publications
(37 citation statements)
references
References 19 publications
0
37
0
Order By: Relevance
“…To successfully perform such attacks the layout of the IC must first be reverse-engineered. Several approaches for reverse-engineering ICs have been proposed in previous works [14,16,17]. In reality, for most attacks it is sufficient to reverse-engineer just the datapath between non-volatile memory and the CPU core.…”
Section: Countermeasures and Attack Mitigationmentioning
confidence: 99%
“…To successfully perform such attacks the layout of the IC must first be reverse-engineered. Several approaches for reverse-engineering ICs have been proposed in previous works [14,16,17]. In reality, for most attacks it is sufficient to reverse-engineer just the datapath between non-volatile memory and the CPU core.…”
Section: Countermeasures and Attack Mitigationmentioning
confidence: 99%
“…The netlist can allow for identification of hardware trojans in the implementation [9] or POIs for conducting successful attacks such as micro-probing from the frontside of the chip [10], [11]. To prevent such attacks, many modern IC designs contain active meshes on the frontside of the chip to alert the CPU, when the integrity of the IC is compromised [12].…”
Section: Related Workmentioning
confidence: 99%
“…The works that come closest to our work are those developed in the context of verifying hardware implementations of word-level arithmetic operations. There is a long history of heuristics for identifying bit-vector (or word-level) operators from gate-level implementations (see, for example, [19,20,22,23] for a small sampling). The use of canonical representations of arithmetic operations have also been explored in the context of verifying arithmetic circuits like multipliers (see [29,30], among others).…”
Section: Related Workmentioning
confidence: 99%
“…Indeed, variants of this approach have been used earlier in different contexts [19,20,21,22,23]. In the context of SMT solving, however, more caution is needed.…”
Section: Introductionmentioning
confidence: 99%