WordRev: Finding word-level structures in a sea of bit-level gates

Systems are increasingly being constructed from off-the-shelf components acquired through a globally distributed and untrusted supply chain. Often only post-synthesis gate-level netlists or actual silicons are available for security inspection. This makes reasoning about hardware trojans particularl...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Wenchao Li, Gascon, Adria, Subramanyan, Pramod, Wei Yang Tan, Tiwari, Ashish, Malik, Sharad, Shankar, Natarajan, Seshia, Sanjit A.
Format: Tagungsbericht
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 74
container_issue
container_start_page 67
container_title
container_volume
creator Wenchao Li
Gascon, Adria
Subramanyan, Pramod
Wei Yang Tan
Tiwari, Ashish
Malik, Sharad
Shankar, Natarajan
Seshia, Sanjit A.
description Systems are increasingly being constructed from off-the-shelf components acquired through a globally distributed and untrusted supply chain. Often only post-synthesis gate-level netlists or actual silicons are available for security inspection. This makes reasoning about hardware trojans particularly challenging given the enormous scale of the problem. Currently, there is no mature methodology that can provide visibility into a bit-level design in terms of high-level components to allow more comprehensive analysis. In this paper, we present a systemic way of automatically deriving word-level structures from the gate-level netlist of a digital circuit. Our framework also provides the possibility for a user to specify sequences of word-level operations and it can extract the collection of gates corresponding to those operations. We demonstrate the effectiveness of our approach on a system-on-a-chip (SoC) design consisting of approximately 400,000 IBM 12SOI cells and several open-source designs.
doi_str_mv 10.1109/HST.2013.6581568
format Conference Proceeding
fullrecord <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_6581568</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>6581568</ieee_id><sourcerecordid>6581568</sourcerecordid><originalsourceid>FETCH-LOGICAL-i1328-e3f9033ad1c38efe264062c3a8227342812ab12e686434bac86a5aee3d7d0dfe3</originalsourceid><addsrcrecordid>eNotj1FLwzAUhSMiqLPvgi_5A625uWma-KbDOWEg6MTHcdvcjsjspOkm_vsN1qfD-fg4cIS4BVUAKH8__1gWWgEWtnRQWncmMl85MJX3yiqlzsX1qZSlx0uRpfR9pOBtZZ25Ek9f2z688_5BzmIXYreWf0eQb3jPG5mGftcMu56TjJ0kmZjktpV1HEZhTQOnG3HR0iZxNuZEfM6el9N5vnh7eZ0-LvIIqF3O2HqFSAEadNyytkZZ3SA5rSs02oGmGjRbZw2amhpnqSRmDFVQoWWciLvTbmTm1W8ff6j_X4238QDAako2</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>WordRev: Finding word-level structures in a sea of bit-level gates</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Wenchao Li ; Gascon, Adria ; Subramanyan, Pramod ; Wei Yang Tan ; Tiwari, Ashish ; Malik, Sharad ; Shankar, Natarajan ; Seshia, Sanjit A.</creator><creatorcontrib>Wenchao Li ; Gascon, Adria ; Subramanyan, Pramod ; Wei Yang Tan ; Tiwari, Ashish ; Malik, Sharad ; Shankar, Natarajan ; Seshia, Sanjit A.</creatorcontrib><description>Systems are increasingly being constructed from off-the-shelf components acquired through a globally distributed and untrusted supply chain. Often only post-synthesis gate-level netlists or actual silicons are available for security inspection. This makes reasoning about hardware trojans particularly challenging given the enormous scale of the problem. Currently, there is no mature methodology that can provide visibility into a bit-level design in terms of high-level components to allow more comprehensive analysis. In this paper, we present a systemic way of automatically deriving word-level structures from the gate-level netlist of a digital circuit. Our framework also provides the possibility for a user to specify sequences of word-level operations and it can extract the collection of gates corresponding to those operations. We demonstrate the effectiveness of our approach on a system-on-a-chip (SoC) design consisting of approximately 400,000 IBM 12SOI cells and several open-source designs.</description><identifier>ISBN: 1479905593</identifier><identifier>ISBN: 9781479905591</identifier><identifier>EISBN: 9781479906000</identifier><identifier>EISBN: 147990600X</identifier><identifier>EISBN: 1479906018</identifier><identifier>EISBN: 9781479906017</identifier><identifier>DOI: 10.1109/HST.2013.6581568</identifier><language>eng</language><publisher>IEEE</publisher><subject>Adders ; Logic gates ; Reverse engineering ; Shape ; Trojan horses ; Wires</subject><ispartof>2013 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), 2013, p.67-74</ispartof><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/6581568$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>310,311,781,785,790,791,2059,27930,54925</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/6581568$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Wenchao Li</creatorcontrib><creatorcontrib>Gascon, Adria</creatorcontrib><creatorcontrib>Subramanyan, Pramod</creatorcontrib><creatorcontrib>Wei Yang Tan</creatorcontrib><creatorcontrib>Tiwari, Ashish</creatorcontrib><creatorcontrib>Malik, Sharad</creatorcontrib><creatorcontrib>Shankar, Natarajan</creatorcontrib><creatorcontrib>Seshia, Sanjit A.</creatorcontrib><title>WordRev: Finding word-level structures in a sea of bit-level gates</title><title>2013 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST)</title><addtitle>HST</addtitle><description>Systems are increasingly being constructed from off-the-shelf components acquired through a globally distributed and untrusted supply chain. Often only post-synthesis gate-level netlists or actual silicons are available for security inspection. This makes reasoning about hardware trojans particularly challenging given the enormous scale of the problem. Currently, there is no mature methodology that can provide visibility into a bit-level design in terms of high-level components to allow more comprehensive analysis. In this paper, we present a systemic way of automatically deriving word-level structures from the gate-level netlist of a digital circuit. Our framework also provides the possibility for a user to specify sequences of word-level operations and it can extract the collection of gates corresponding to those operations. We demonstrate the effectiveness of our approach on a system-on-a-chip (SoC) design consisting of approximately 400,000 IBM 12SOI cells and several open-source designs.</description><subject>Adders</subject><subject>Logic gates</subject><subject>Reverse engineering</subject><subject>Shape</subject><subject>Trojan horses</subject><subject>Wires</subject><isbn>1479905593</isbn><isbn>9781479905591</isbn><isbn>9781479906000</isbn><isbn>147990600X</isbn><isbn>1479906018</isbn><isbn>9781479906017</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2013</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNotj1FLwzAUhSMiqLPvgi_5A625uWma-KbDOWEg6MTHcdvcjsjspOkm_vsN1qfD-fg4cIS4BVUAKH8__1gWWgEWtnRQWncmMl85MJX3yiqlzsX1qZSlx0uRpfR9pOBtZZ25Ek9f2z688_5BzmIXYreWf0eQb3jPG5mGftcMu56TjJ0kmZjktpV1HEZhTQOnG3HR0iZxNuZEfM6el9N5vnh7eZ0-LvIIqF3O2HqFSAEadNyytkZZ3SA5rSs02oGmGjRbZw2amhpnqSRmDFVQoWWciLvTbmTm1W8ff6j_X4238QDAako2</recordid><startdate>201306</startdate><enddate>201306</enddate><creator>Wenchao Li</creator><creator>Gascon, Adria</creator><creator>Subramanyan, Pramod</creator><creator>Wei Yang Tan</creator><creator>Tiwari, Ashish</creator><creator>Malik, Sharad</creator><creator>Shankar, Natarajan</creator><creator>Seshia, Sanjit A.</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>201306</creationdate><title>WordRev: Finding word-level structures in a sea of bit-level gates</title><author>Wenchao Li ; Gascon, Adria ; Subramanyan, Pramod ; Wei Yang Tan ; Tiwari, Ashish ; Malik, Sharad ; Shankar, Natarajan ; Seshia, Sanjit A.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i1328-e3f9033ad1c38efe264062c3a8227342812ab12e686434bac86a5aee3d7d0dfe3</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2013</creationdate><topic>Adders</topic><topic>Logic gates</topic><topic>Reverse engineering</topic><topic>Shape</topic><topic>Trojan horses</topic><topic>Wires</topic><toplevel>online_resources</toplevel><creatorcontrib>Wenchao Li</creatorcontrib><creatorcontrib>Gascon, Adria</creatorcontrib><creatorcontrib>Subramanyan, Pramod</creatorcontrib><creatorcontrib>Wei Yang Tan</creatorcontrib><creatorcontrib>Tiwari, Ashish</creatorcontrib><creatorcontrib>Malik, Sharad</creatorcontrib><creatorcontrib>Shankar, Natarajan</creatorcontrib><creatorcontrib>Seshia, Sanjit A.</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Wenchao Li</au><au>Gascon, Adria</au><au>Subramanyan, Pramod</au><au>Wei Yang Tan</au><au>Tiwari, Ashish</au><au>Malik, Sharad</au><au>Shankar, Natarajan</au><au>Seshia, Sanjit A.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>WordRev: Finding word-level structures in a sea of bit-level gates</atitle><btitle>2013 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST)</btitle><stitle>HST</stitle><date>2013-06</date><risdate>2013</risdate><spage>67</spage><epage>74</epage><pages>67-74</pages><isbn>1479905593</isbn><isbn>9781479905591</isbn><eisbn>9781479906000</eisbn><eisbn>147990600X</eisbn><eisbn>1479906018</eisbn><eisbn>9781479906017</eisbn><abstract>Systems are increasingly being constructed from off-the-shelf components acquired through a globally distributed and untrusted supply chain. Often only post-synthesis gate-level netlists or actual silicons are available for security inspection. This makes reasoning about hardware trojans particularly challenging given the enormous scale of the problem. Currently, there is no mature methodology that can provide visibility into a bit-level design in terms of high-level components to allow more comprehensive analysis. In this paper, we present a systemic way of automatically deriving word-level structures from the gate-level netlist of a digital circuit. Our framework also provides the possibility for a user to specify sequences of word-level operations and it can extract the collection of gates corresponding to those operations. We demonstrate the effectiveness of our approach on a system-on-a-chip (SoC) design consisting of approximately 400,000 IBM 12SOI cells and several open-source designs.</abstract><pub>IEEE</pub><doi>10.1109/HST.2013.6581568</doi><tpages>8</tpages><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier ISBN: 1479905593
ispartof 2013 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), 2013, p.67-74
issn
language eng
recordid cdi_ieee_primary_6581568
source IEEE Electronic Library (IEL) Conference Proceedings
subjects Adders
Logic gates
Reverse engineering
Shape
Trojan horses
Wires
title WordRev: Finding word-level structures in a sea of bit-level gates
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-11T22%3A35%3A17IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=WordRev:%20Finding%20word-level%20structures%20in%20a%20sea%20of%20bit-level%20gates&rft.btitle=2013%20IEEE%20International%20Symposium%20on%20Hardware-Oriented%20Security%20and%20Trust%20(HOST)&rft.au=Wenchao%20Li&rft.date=2013-06&rft.spage=67&rft.epage=74&rft.pages=67-74&rft.isbn=1479905593&rft.isbn_list=9781479905591&rft_id=info:doi/10.1109/HST.2013.6581568&rft_dat=%3Cieee_6IE%3E6581568%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&rft.eisbn=9781479906000&rft.eisbn_list=147990600X&rft.eisbn_list=1479906018&rft.eisbn_list=9781479906017&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=6581568&rfr_iscdi=true