Journal of Xidian University ›› 2019, Vol. 46 ›› Issue (4): 167-175.doi: 10.19665/j.issn1001-2400.2019.04.023

Previous Articles     Next Articles

Hardware trojan attack methods and security analysis under split manufacturing

YANG Yajun1,2,3,CHEN Zhang1   

  1. 1.School of Information Science & Technology, ShanghaiTech Univ., Shanghai 201210, China
    2.Shanghai Institute of Microsystem & Information Technology, Chinese Academy of Sciences,Shanghai 200050, China
    3.School of Electronic, Electrical and Communication Engineering, University of Chinese Academy of Sciences, Beijing 100049, China
  • Received:2019-01-12 Online:2019-08-20 Published:2019-08-15

Abstract:

The Hardware Trojan (HT) threats the security of chips greatly, and in order to explore the effectiveness of split manufacturing (SM) securing circuits from HT insertion, an HT threat model is first proposed under SM. Then we propose two possible attack methods: one is the improved proximity-based attack and the other is the genetic algorithm based attack, which leverage different physical heuristics revealed from the physical design process. Experimental results show that both the proposed methods are effective on inserting HTs under SM. Especially the genetic algorithm based attack method is shown to be the most effective with the attack accuracy of up to 78.62%, thus demonstrating that SM is not secure inherently and that more efforts need to be made in order to make SM more secure.

Key words: hardware security, split manufacturing, hardware Trojan, attack, genetic algorithm

CLC Number: 

  • TN47