HAL-The Missing Piece of the Puzzle for Hardware Reverse Engineering, Trojan Detection and Insertion

Hardware manipulations pose a serious threat to numerous systems, ranging from a myriad of smart-X devices to military systems. In many attack scenarios an adversary merely has access to the low-level, potentially obfuscated gate-level netlist. In general, the attacker possesses minimal information...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:IEEE transactions on dependable and secure computing 2019-05, Vol.16 (3), p.498-510
Hauptverfasser: Fyrbiak, Marc, Wallat, Sebastian, Swierczynski, Pawel, Hoffmann, Max, Hoppach, Sebastian, Wilhelm, Matthias, Weidlich, Tobias, Tessier, Russell, Paar, Christof
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:Hardware manipulations pose a serious threat to numerous systems, ranging from a myriad of smart-X devices to military systems. In many attack scenarios an adversary merely has access to the low-level, potentially obfuscated gate-level netlist. In general, the attacker possesses minimal information and faces the costly and time-consuming task of reverse engineering the design to identify security-critical circuitry, followed by the insertion of a meaningful hardware Trojan. These challenges have been considered only in passing by the research community. The contribution of this work is threefold: First, we present \sf {HAL}HAL, a comprehensive reverse engineering and manipulation framework for gate-level netlists. \sf {HAL}HAL allows automating defensive design analysis (e.g., including arbitrary Trojan detection algorithms with minimal effort) as well as offensive reverse engineering and targeted logic insertion. Second, we present a novel static analysis Trojan detection technique \sf {ANGEL}ANGEL which considerably reduces the false-positive detection rate of the detection technique \sf {FANCI}FANCI. Furthermore, we demonstrate that \sf {ANGEL}ANGEL is capable of automatically detecting Trojans obfuscated with \sf {DeTrust}DeTrust. Third, we demonstrate how a malicious party can semi-automatically inject hardware Trojans into third-party designs. We present reverse engineering algorithms to disarm and trick cryptographic self-tests, and subtly leak cryptographic keys without any a priori knowledge of the design's internal workings.
ISSN:1545-5971
1941-0018
DOI:10.1109/TDSC.2018.2812183