透過您的圖書館登入
IP:18.219.138.65
  • 學位論文

可規避邏輯閘層結構與SCOAP特徵檢測之硬體木馬生成框架研究

A Hardware Trojan Insertion Framework against Gate-Level Netlist Structural Feature and SCOAP-based Detection

指導教授 : 郭斯彥
若您是本文的作者,可授權文章由華藝線上圖書館中協助推廣。

摘要


隨著IC產業的蓬勃發展,積體電路產業的分工也越來越細緻化與國際化,因產業分工越來越明確,使用第三方資源已無可避免,然而,任何來自或經過第三方公司的資源都將是不可信任的,也因此,新型態的硬體安全疑慮大量衍生,而其中硬體木馬獲得主要關注。多數木馬研究學者皆於偵測硬體木馬技術的發展,而疏於木馬產生、插入和攻擊技術,而此將造成偵測技術發展的偏頗,因此,本論文提出一種全新且自動化的木馬產生框架以規避主流的邏輯閘層硬體木馬偵測技術。主流的邏輯閘木馬偵測技術可分為兩種,其一為基於電路邏輯閘結構,其二為基於Sandia Controllability/Observability Analysis Program (SCOAP) 分數,在我們的框架中,我們使用貪婪算法去構成硬體木馬,貪婪算法使的木馬結構與一般電路結構盡量相似,而後,藉由插入特殊結構與一般訊號已達到降低SCOAP分數的目的,實驗結果顯示,相較於一般的隨機方式,我們提出的貪婪方法能提供更好的選擇,此外,在SCOAP分數降低環節插入三條一般訊號後,可以降低68\%的SCOAP分數,最後,我們將產生的硬體木馬結果測試目前最知名以及最新的基於結構以及基於SCOAP分數的偵測器,結果顯示,兩種偵測器均有很高的偽陽性率和偽陰性率以及很低的準確度。

並列摘要


The division of labor in the integrated circuit (IC) industry has become more detailed. Outsourcing IC design or fabrication to third-party vendors is inevitable, which has caused a variety of hardware security issues. With the attention of hardware Trojan, most recent research has focused on detection techniques instead of attack or insertion methods. Existing detection methods for gate level can be classified into two categories: one based on circuit structure features and the other based on the Sandia Controllability/Observability Analysis Program (SCOAP) values. This paper proposes a new hardware Trojan insertion framework that can automatically construct Trojan with low SCOAP values against both structural features-based and SCOAP-based detection techniques. In our framework, we use the greedy algorithm to build a Trojan structure similar to a genuine circuit as much as possible and then reduce SCOAP values by inserting genuine nets. The experimental results demonstrated that our greedy method achieves significant improvements in structure generation than the random method. Moreover, the insertion framework can reduce the average SCOAP values by 68\% after inserting three genuine nets. Finally, we evaluate state-of-the-art detection techniques using hardware Trojan samples generated by our proposed framework, which provides a high False Positive Rate (FPR)/False Negative Rate (FNR) and low accuracy.

參考文獻


References
[1] Trust-hub. Available on-line: https://www.trust-hub.org, 2016.
[2] J. Cruz et al., ”An automated configurable Trojan insertion framework for dynamic trust benchmarks,” 2018 Design, Automation Test in Europe Conference Exhibition (DATE), 2018, pp. 1598-1603.
[3] H. Salmani, ” COTD: Reference-Free Hardware Trojan Detection and Recovery Based on Controllability and Observability in Gate-Level Netlist,” in IEEE Transactions on Information Forensics and Security, vol. 12, no. 2, pp. 338-350, Feb. 2017.
[4] K. Hasegawa et al., ”Trojan-feature extraction at gate-level netlists and its application to hardware-Trojan detection using random forest classifier,” 2017 IEEE International Symposium on Circuits and Systems (ISCAS), 2017, pp. 1-4

延伸閱讀