Machine Learning and Structural Characteristics for Reverse Engineering

被引:13
作者
Baehr, Johanna [1 ]
Bernardini, Alessandro [1 ]
Sigl, Georg [1 ]
Schlichtmann, Ulf [1 ]
机构
[1] Tech Univ Munich, Munich, Germany
来源
24TH ASIA AND SOUTH PACIFIC DESIGN AUTOMATION CONFERENCE (ASP-DAC 2019) | 2019年
关键词
D O I
10.1145/3287624.3288740
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In the past years, much of the research into hardware reverse engineering has focused on the abstraction of gate level netlists to a human readable form. However, none of the proposed methods consider a realistic reverse engineering scenario, where the netlist is physically extracted from a chip. This paper analyzes how errors caused by this extraction and the later partitioning of the netlist affect the ability to identify the functionality. Current formal verification based methods, which compare against a golden model, are incapable of dealing with such erroneous netlists. Two new methods are proposed, which focus on the idea that structural similarity implies functional similarity. The first approach uses fuzzy structural similarity matching to compare the structural characteristics of an unknown design against designs in a golden model library using machine learning. The second approach proposes a method for inexact graph matching using fuzzy graph isomorphisms, based on the functionalities of gates used within the design. For realistic error percentages, both approaches are able to match more than 90% of designs correctly. This is an important first step for hardware reverse engineering methods beyond formal verification based equivalence matching.
引用
收藏
页码:96 / 103
页数:8
相关论文
共 18 条
[1]  
Albrecht C., 2005, IWLS
[2]   Fast unfolding of communities in large networks [J].
Blondel, Vincent D. ;
Guillaume, Jean-Loup ;
Lambiotte, Renaud ;
Lefebvre, Etienne .
JOURNAL OF STATISTICAL MECHANICS-THEORY AND EXPERIMENT, 2008,
[3]   On variants of shortest-path betweenness centrality and their generic computation [J].
Brandes, Ulrik .
SOCIAL NETWORKS, 2008, 30 (02) :136-145
[4]   Reverse Engineering Digital ICs through Geometric Embedding of Circuit Graphs [J].
Cakir, Burcin ;
Malik, Sharad .
ACM TRANSACTIONS ON DESIGN AUTOMATION OF ELECTRONIC SYSTEMS, 2018, 23 (04)
[5]  
Carletti V., 2016, THESIS
[6]  
Couch J, 2016, PROCEEDINGS OF THE 2016 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST), P75, DOI 10.1109/HST.2016.7495560
[7]  
Koutra D, 2011, P EC INF C, V17
[8]  
Meade Travis, 2018, J. Hardware and Systems Security, V2, P201
[9]  
Newman M., 2010, Networks: an introduction, DOI [10.1093/acprof:oso/9780199206650.001.0001, DOI 10.1093/ACPROF:OSO/9780199206650.001.0001]
[10]  
Oklahoma State University, OKL STAT U SYST CHIP