Skip to main navigation Skip to search Skip to main content

Design comparison to identify malicious hardware in external intellectual property

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Modern circuits incorporate many components that are designed by outside sources. Unfortunately, these external designs introduce a new vector of attacking a circuit through the introduction of malicious hardware. Identifying such an insertion in external intellectual property is difficult, as the labor cost and time required to investigate these designs manually is prohibitive. Additionally, due to state explosion, it is impossible to exhaustively test every possible input combination. This paper describes a method of automatically comparing two different circuits with similar functionality, in order to verify that these two designs do what they are supposed to do, and nothing more. The designs are compared by unrolling the state logic internally, so that the design outputs are represented in terms of prior inputs. This technique is advantageous as neither design needs to be a known safe design, making the task of finding similar circuits simple. Additionally, this converts the state explosion dilemma into a more easily computable Boolean satisfiability problem. The technique has been evaluated using several benchmark circuits, including circuits that contain malicious modifications. © 2011 IEEE.
Original languageEnglish
Title of host publication10th IEEE Int. Conf. on Trust, Security and Privacy in Computing and Communications, TrustCom 2011, 8th IEEE Int. Conf. on Embedded Software and Systems, ICESS 2011, 6th Int. Conf. on Frontier of Computer Science and Technology, FCST 2011
DOIs
StatePublished - 2011

Fingerprint

Dive into the research topics of 'Design comparison to identify malicious hardware in external intellectual property'. Together they form a unique fingerprint.

Cite this