hardware security - university of maryland · 2019-06-18 · hardware security chongxi bao, yang...

1
Hardware Security Chongxi Bao, Yang Xie, Abhishek Chakraborty, Ankit Mondal, Yuntao Liu Prof. Ankur Srivastava Hardware Trojan Detection This work was supported by NSF under Grant No. 1223233 and AFOSR under Grant FA9550-14-1-0351. Lab and other logos here (small) Hardware IP Protection Layout External Fountry Infected ICs Foundry-inserted Trojans Reverse-engineering (RE) [Torrance et al, CHES-2009] RE-based Trojan Detection Flow One grid in the IC SVM Classifier Final Step Design-Time Fab-Time Test-Time May be inserted at: Results Detect three kinds Accuracy > 99.6% False positive <1% Trojan-free Trojan-deletion Trojan-addition Parametric 1.IC supply chain attack 2. 2.5D Split Fabrication 2.5D Split fabrication: The interposer layer can be fabricated separately in a trusted foundry Security-aware Design Flow Secure partitioning: function obfuscation Secure Placement: layout obfuscation 3. Logic Locking Anti-SAT block: the number of SAT attack iteration λ is an exponential function of key-size k 1. Magnetic Tunnel Junction Side-channel Attack on Emerging Technology 2. MTJ Switching Characteristics 3. Proposed Power Model 4. Correlation Power Analysis Attack (b) Net variation in power of an MRAM cell: (a) Vertical alignment of power traces Power profiles due to AP to P & P to AP are different ! Spin polarized current can switch states through spin-torque transfer (STT) LP Based Attack on Physical Unclonable Functions Target PUFs The Arbiter PUF Memristor Crossbar PUF The response is : the feature vector, : the weight vector. 1 0 if 0 otherwise T r D Φ⋅ = > r r Φ r D r

Upload: others

Post on 01-Aug-2020

2 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Hardware Security - University Of Maryland · 2019-06-18 · Hardware Security Chongxi Bao, Yang Xie, Abhishek Chakraborty, Ankit Mondal, Yuntao Liu Prof. Ankur Srivastava Hardware

Hardware Security Chongxi Bao, Yang Xie, Abhishek Chakraborty, Ankit Mondal, Yuntao Liu Prof. Ankur Srivastava

Hardware Trojan Detection

This work was supported by NSF under Grant No. 1223233 and AFOSR under Grant FA9550-14-1-0351.

Lab and other logos here (small)

Hardware IP Protection

Layout External Fountry Infected ICs

Foundry-inserted Trojans Reverse-engineering (RE)

[Torrance et al, CHES-2009] RE-based Trojan Detection Flow

One grid in the IC

SVM Classifier Final Step

Design-Time Fab-Time Test-Time

May be inserted at:

Results •  Detect three kinds

•  Accuracy > 99.6%

•  False positive <1%

Trojan-free Trojan-deletion

Trojan-addition Parametric

1.IC supply chain attack

2. 2.5D Split Fabrication

•  2.5D Split fabrication: The interposer layer can be fabricated separately in a trusted foundry

•  Security-aware Design Flow

•  Secure partitioning: function obfuscation

•  Secure Placement: layout obfuscation

3. Logic Locking

Anti-SAT block: the number of SAT attack iteration λ is an exponential function of key-size k

1. Magnetic Tunnel Junction Side-channel Attack on Emerging Technology

2. MTJ Switching Characteristics

3. Proposed Power Model

4. Correlation Power Analysis Attack

(b) Net variation in power of an MRAM cell:

(a) Vertical alignment of power traces

Power profiles due to AP to P & P to AP are different !

Spin polarized current can switch states through spin-torque transfer (STT)

LP Based Attack on Physical Unclonable Functions Target PUFs The Arbiter PUF

Memristor Crossbar PUF

The response is

: the feature vector, : the weight vector.

10if 0otherwise

T

r DΦ ⋅= ⎨⎩

>⎧rr

Φr

Dr