New threats, grouped under the name of hardware attacks, became a serious concern in recent years. In a global market, untrusted parties in the supply chain may jeopardize the production of integrated circuits with intellectual-property piracy, illegal overproduction, and hardware Trojan-horses injection. While one way to protect from overproduction is to encrypt the design by inserting logic gates that prevents the circuit from generating the correct outputs unless the right key is used, reducing the number of poorly-controllable signals is known to minimize the chances for an attacker to successfully hide the trigger for some malicious payload. Several approaches successfully tackled independently these two issues. Differently, this paper proposes a novel technique based on a multi-objective evolutionary algorithm able to increase hardware security by explicitly targeting both the minimization of rare signals and the maximization of the efficacy of logic encryption. Experimental results demonstrate the effectiveness of the proposed method.

An Evolutionary Approach to Hardware Encryption and Trojan-Horse Mitigation / Marcelli, Andrea; Restifo, Marco; Sanchez, Ernesto; Squillero, Giovanni. - ELETTRONICO. - (2017). (Intervento presentato al convegno Design, Automation and Test in Europe, DATE 2017 tenutosi a Laussane, Switzerland nel 27-31 March 2017) [10.23919/DATE.2017.7927244].

An Evolutionary Approach to Hardware Encryption and Trojan-Horse Mitigation

MARCELLI, ANDREA;RESTIFO, MARCO;Sanchez, Ernesto;SQUILLERO, GIOVANNI
2017

Abstract

New threats, grouped under the name of hardware attacks, became a serious concern in recent years. In a global market, untrusted parties in the supply chain may jeopardize the production of integrated circuits with intellectual-property piracy, illegal overproduction, and hardware Trojan-horses injection. While one way to protect from overproduction is to encrypt the design by inserting logic gates that prevents the circuit from generating the correct outputs unless the right key is used, reducing the number of poorly-controllable signals is known to minimize the chances for an attacker to successfully hide the trigger for some malicious payload. Several approaches successfully tackled independently these two issues. Differently, this paper proposes a novel technique based on a multi-objective evolutionary algorithm able to increase hardware security by explicitly targeting both the minimization of rare signals and the maximization of the efficacy of logic encryption. Experimental results demonstrate the effectiveness of the proposed method.
2017
978-1-5090-5826-6
File in questo prodotto:
Non ci sono file associati a questo prodotto.
Pubblicazioni consigliate

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11583/2669696
 Attenzione

Attenzione! I dati visualizzati non sono stati sottoposti a validazione da parte dell'ateneo