Graph Similarity and its Applications to Hardware Security

被引:28
|
作者
Fyrbiak, Marc [1 ]
Wallat, Sebastian [2 ]
Reinhard, Sascha [1 ]
Bissantz, Nicolai [1 ]
Paar, Christof [1 ,2 ]
机构
[1] Ruhr Univ Bochum, Horst Gortz Inst IT Secur, D-44801 Bochum, Germany
[2] Univ Massachusetts, Amherst, MA 01003 USA
基金
美国国家科学基金会; 欧洲研究理事会;
关键词
Hardware; Logic gates; Reverse engineering; Registers; Security; Trojan horses; Optimization; Graph similarity; hardware reverse engineering; hardware trojan; hardware obfuscation assessment; LEVEL; OBFUSCATION; ATTACKS; TROJANS;
D O I
10.1109/TC.2019.2953752
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Hardware reverse engineering is a powerful and universal tool for both security engineers and adversaries. From a defensive perspective, it allows for detection of intellectual property infringements and hardware Trojans, while it simultaneously can be used for product piracy and malicious circuit manipulations. From a designer's perspective, it is crucial to have an estimate of the costs associated with reverse engineering, yet little is known about this, especially when dealing with obfuscated hardware. The contribution at hand provides new insights into this problem, based on algorithms with sound mathematical underpinnings. Our contributions are threefold: First, we present the graph similarity problem for automating hardware reverse engineering. To this end, we improve several state-of-the-art graph similarity heuristics with optimizations tailored to the hardware context. Second, we propose a novel algorithm based on multiresolutional spectral analysis of adjacency matrices. Third, in three extensively evaluated case studies, namely (1) gate-level netlist reverse engineering, (2) hardware Trojan detection, and (3) assessment of hardware obfuscation, we demonstrate the practical nature of graph similarity algorithms.
引用
收藏
页码:505 / 519
页数:15
相关论文
共 50 条
  • [1] Memristors for Hardware Security Applications
    Pang, Yachuan
    Gao, Bin
    Lin, Bohan
    Qian, He
    Wu, Huaqiang
    ADVANCED ELECTRONIC MATERIALS, 2019, 5 (09):
  • [2] A Hardware Generator for Factor Graph Applications
    Demma, James
    Athanas, Peter
    2014 INTERNATIONAL CONFERENCE ON RECONFIGURABLE COMPUTING AND FPGAS (RECONFIG), 2014,
  • [3] Applications of Machine Learning in Hardware Security
    Halak, Basel
    Mispan, Mohd Syafiq
    2022 2ND INTERNATIONAL CONFERENCE OF SMART SYSTEMS AND EMERGING TECHNOLOGIES (SMARTTECH 2022), 2022, : 212 - 213
  • [4] The Applications of NVM Technology in Hardware Security
    Yang, Chaofei
    Liu, Beiye
    Wang, Yandan
    Chen, Yiran
    Li, Hai
    Zhang, Xian
    Sun, Guangyu
    2016 INTERNATIONAL GREAT LAKES SYMPOSIUM ON VLSI (GLSVLSI), 2016, : 311 - 316
  • [5] Exploiting Lithography Limits for Hardware Security Applications
    Khan, Raihan Sayeed
    Noor, Nafisa
    Jin, Chenglu
    Muneer, Sadid
    Dirisaglik, Faruk
    Cywar, Adam
    Phuong Ha Nguyen
    van Dijk, Marten
    Gokirmak, Ali
    Silva, Helena
    2019 IEEE 19TH INTERNATIONAL CONFERENCE ON NANOTECHNOLOGY (IEEE-NANO 2019), 2019, : 9 - 12
  • [6] RRAM Based Cell for Hardware Security Applications
    Arumi, Daniel
    Manich, Salvador
    Rodriguez-Montanes, Rosa
    2016 1ST IEEE INTERNATIONAL VERIFICATION AND SECURITY WORKSHOP (IVSW), 2016, : 7 - 12
  • [7] Platforms and Applications in Hardware Security: Trends and Challenges
    Moreno, Edward David
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2013, 7 (05): : 289 - 304
  • [8] Hardware Security Assurance in Emerging IoT Applications
    Dofe, Jaya
    Frey, Jonathan
    Yu, Qiaoyan
    2016 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2016, : 2050 - 2053
  • [9] Hardware Security Applications of Emerging Nonvolatile Memories
    Chen, An
    PROCEEDINGS OF 2015 IEEE 11TH INTERNATIONAL CONFERENCE ON ASIC (ASICON), 2015,
  • [10] Implementation of an FFT hardware accelerator for security applications
    Argenziano, Domenico
    2015 10TH INTERNATIONAL CONFERENCE ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING (3PGCIC), 2015, : 256 - 259