SCARF: Securing Chips with a Robust Framework against Fabrication-time Hardware Trojans

Сохранить в:
Библиографические подробности
Опубликовано в::arXiv.org (Aug 28, 2024), p. n/a
Главный автор: Eslami, Mohammad
Другие авторы: Ghasempouri, Tara, Pagliarini, Samuel
Опубликовано:
Cornell University Library, arXiv.org
Предметы:
Online-ссылка:Citation/Abstract
Full text outside of ProQuest
Метки: Добавить метку
Нет меток, Требуется 1-ая метка записи!

MARC

LEADER 00000nab a2200000uu 4500
001 2928715005
003 UK-CbPIL
022 |a 2331-8422 
024 7 |a 10.1109/TC.2024.3449082  |2 doi 
035 |a 2928715005 
045 0 |b d20240828 
100 1 |a Eslami, Mohammad 
245 1 |a SCARF: Securing Chips with a Robust Framework against Fabrication-time Hardware Trojans 
260 |b Cornell University Library, arXiv.org  |c Aug 28, 2024 
513 |a Working Paper 
520 3 |a The globalization of the semiconductor industry has introduced security challenges to Integrated Circuits (ICs), particularly those related to the threat of Hardware Trojans (HTs) - malicious logic that can be introduced during IC fabrication. While significant efforts are directed towards verifying the correctness and reliability of ICs, their security is often overlooked. In this paper, we propose a comprehensive approach to enhance IC security from the front-end to back-end stages of design. Initially, we outline a systematic method to transform existing verification assets into potent security checkers by repurposing verification assertions. To further improve security, we introduce an innovative technique for integrating online monitors during physical synthesis - a back-end insertion providing an additional layer of defense. Experimental results demonstrate a significant increase in security, measured by our introduced metric, Security Coverage (SC), with a marginal rise in area and power consumption, typically under 20%. The insertion of online monitors during physical synthesis enhances security metrics by up to 33.5%. This holistic approach offers a comprehensive and resilient defense mechanism across the entire spectrum of IC design. 
653 |a Verification 
653 |a Monitors 
653 |a Security 
653 |a Integrated circuits 
653 |a Hardware 
653 |a Synthesis 
653 |a Power consumption 
653 |a Globalization 
653 |a Insertion 
700 1 |a Ghasempouri, Tara 
700 1 |a Pagliarini, Samuel 
773 0 |t arXiv.org  |g (Aug 28, 2024), p. n/a 
786 0 |d ProQuest  |t Engineering Database 
856 4 1 |3 Citation/Abstract  |u https://www.proquest.com/docview/2928715005/abstract/embedded/7BTGNMKEMPT1V9Z2?source=fedsrch 
856 4 0 |3 Full text outside of ProQuest  |u http://arxiv.org/abs/2402.12162