西安电子科技大学学报 ›› 2019, Vol. 46 ›› Issue (4): 167-175.doi: 10.19665/j.issn1001-2400.2019.04.023

• • 上一篇    下一篇

分块制造下硬件木马攻击方法及安全性分析

杨亚君1,2,3,陈章1   

  1. 1.上海科技大学 信息科学与技术学院,上海 201210
    2.中国科学院 上海微系统与信息技术研究所,上海 200050
    3.中国科学院大学 电子电气与通信工程学院,北京 100049
  • 收稿日期:2019-01-12 出版日期:2019-08-20 发布日期:2019-08-15
  • 作者简介:杨亚君(1993—),女,上海微系统与信息技术研究所硕士研究生,E-mail: yangyj@shanghaitech.edu.cn.
  • 基金资助:
    国家自然科学基金(61401276)

Hardware trojan attack methods and security analysis under split manufacturing

YANG Yajun1,2,3,CHEN Zhang1   

  1. 1.School of Information Science & Technology, ShanghaiTech Univ., Shanghai 201210, China
    2.Shanghai Institute of Microsystem & Information Technology, Chinese Academy of Sciences,Shanghai 200050, China
    3.School of Electronic, Electrical and Communication Engineering, University of Chinese Academy of Sciences, Beijing 100049, China
  • Received:2019-01-12 Online:2019-08-20 Published:2019-08-15

摘要:

由于硬件木马对芯片的安全性构成了严重威胁,所以研究了分块制造防护芯片遭受硬件木马攻击时的效果。首先提出了分块制造下硬件木马的攻击模型;其次针对此攻击模型提出了两种可能的攻击方法,即改进的近似攻击和基于遗传算法的攻击。这两种方法分别利用了芯片后端设计过程泄露的不同物理信息。实验结果表明,两种攻击方法都能有效地对分块制造下的芯片进行硬件木马植入,其中基于遗传算法的攻击准确率可达到78.62%。同时表明分块制造本身在防护硬件木马攻击上的安全性是不够的,需要采取更多的措施提升分块制造的安全性。

关键词: 硬件安全, 分块制造, 硬件木马, 攻击, 遗传算法

Abstract:

The Hardware Trojan (HT) threats the security of chips greatly, and in order to explore the effectiveness of split manufacturing (SM) securing circuits from HT insertion, an HT threat model is first proposed under SM. Then we propose two possible attack methods: one is the improved proximity-based attack and the other is the genetic algorithm based attack, which leverage different physical heuristics revealed from the physical design process. Experimental results show that both the proposed methods are effective on inserting HTs under SM. Especially the genetic algorithm based attack method is shown to be the most effective with the attack accuracy of up to 78.62%, thus demonstrating that SM is not secure inherently and that more efforts need to be made in order to make SM more secure.

Key words: hardware security, split manufacturing, hardware Trojan, attack, genetic algorithm

中图分类号: 

  • TN47