论文标题

签名:基于挑战反应的询问方案,用于同时水印和特洛伊木马检测

SIGNED: A Challenge-Response Based Interrogation Scheme for Simultaneous Watermarking and Trojan Detection

论文作者

Nair, Abhishek, SLPSK, Patanjali, Rebeiro, Chester, Bhunia, Swarup

论文摘要

涉及不信任各方的电子硬件的分布式制造生态系统的出现导致了多样化的信任问题。特别是,IP盗版,过度生产和硬件特洛伊木马攻击对数字设计制造商构成了重大威胁。水印一直是半导体行业克服许多信任问题的解决方案之一。但是,当前的水印技术的覆盖范围较低,会产生硬件开销,并且容易受到拆除或篡改攻击的影响。此外,这些水印无法检测到针对恶意目的的设计的特洛伊木马植入攻击。我们在我们的框架中解决了这些问题,称为签名:用于数字设计的安全轻巧水印方案。 签名依赖于基于挑战响应方案的审讯方案来生成水印。签名确定了目标网列中的敏感区域,并样品形成了一个紧凑的签名,该标志代表了设计的功能和结构特征。我们表明,该签名可用于以强大的方式同时验证设计的出处,以及在设计过程中的任何阶段对其进行任何恶意改动。我们在ISCAS85和ITC基准电路上评估了签名,即使在低至5范围的修改中,也可以获得87.61 \%的检测准确性。我们进一步证明,签名可以从与逻辑锁定解决方案的集成中受益,在该解决方案中,它可以通过明智地重复使用锁定逻辑来实现防止/回火攻击的保护,并造成较低的开销。

The emergence of distributed manufacturing ecosystems for electronic hardware involving untrusted parties has given rise to diverse trust issues. In particular, IP piracy, overproduction, and hardware Trojan attacks pose significant threats to digital design manufacturers. Watermarking has been one of the solutions employed by the semiconductor industry to overcome many of the trust issues. However, current watermarking techniques have low coverage, incur hardware overheads, and are vulnerable to removal or tampering attacks. Additionally, these watermarks cannot detect Trojan implantation attacks where an adversary alters a design for malicious purposes. We address these issues in our framework called SIGNED: Secure Lightweight Watermarking Scheme for Digital Designs. SIGNED relies on a challenge-response protocol based interrogation scheme for generating the watermark. SIGNED identifies sensitive regions in the target netlist and samples them to form a compact signature that is representative of the functional and structural characteristics of a design. We show that this signature can be used to simultaneously verify, in a robust manner, the provenance of a design, as well as any malicious alterations to it at any stage during design process. We evaluate SIGNED on the ISCAS85 and ITC benchmark circuits and obtain a detection accuracy of 87.61\% even for modifications as low as 5-gates. We further demonstrate that SIGNED can benefit from integration with a logic locking solution, where it can achieve increased protection against removal/tempering attacks and incurs lower overhead through judicious reuse of the locking logic for watermark creation.

扫码加入交流群

加入微信交流群

微信交流群二维码

扫码加入学术交流群,获取更多资源