skip to main content
10.1109/ISCAS.2016.7527495guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
research-article

Gate-level netlist reverse engineering for hardware security: Control logic register identification

Published: 01 May 2016 Publication History

Abstract

The heavy reliance on third-party resources, including third-party IP cores and fabrication foundries, has triggered the security concerns that design backdoors and/or hardware Trojans may be inserted into fabricated chips. While existing reverse engineering tools can help recover netlist from fabricated chips, there is a lack of efficient tools to further analyze the netlist for malicious logic detection and full functionality recovery. While it is relatively easy to identify the functional modules from the netlist using pattern matching methods, the main obstacle is to isolate control logic registers and reverseengineering the control logic. Upon this request, we proposed a topology-based computational method for register categorization. Through this proposed algorithm, we can differentiate data registers from control logic registers such that the control logic can be separated from the datapath. Experimental results showed that the suggested method was capable of identifying control logic registers in circuits with various complexities ranging from the RS232 core to the 8051 microprocessor.

References

[2]
M. Oya, Y. Shi, M. Yanagisawa, and N. Togawa, “A score-based classifiication method for identifying hardware-trojans at gate-level netlists,” in 2015 Design, Automation & Test in Europe Conference & Exhibition (DATE), ser. DATE'15, 2015, pp. 465–470.
[3]
X. Zhang and M. Tehranipoor, “Case study: Detecting hardware trojans in third-party digital ip cores,” in Hardware-Oriented Security and Trust (HOST), 2011 IEEE International Symposium on, 2011, pp. 67–70.
[4]
F. Koushanfar and A. Mirhoseini, “A unified framework for multimodal submodular integrated circuits trojan detection,” IEEE Transactions on Information Forensics and Security, vol. 6, no. 1, pp. 162–174, 2011.
[6]
W. Li, A. Gascon, P. Subramanyan, W. Y. Tan, A. Tiwari, S. Malik, N. Shankar, and S. Seshia, “Wordrev: Finding word-level structures in a sea of bit-level gates,” in Hardware-Oriented Security and Trust (HOST), 2013 IEEE International Symposium on, 2013, pp. 67–74.
[7]
Y. Shi, C. W. Ting, B.-H. Gwee, and Y. Ren, “A highly efficient method for extracting fsms from flattened gate-level netlist,” in Circuits and Systems (ISCAS), Proceedings of 2010 IEEE International Symposium on, 2010, pp. 2610–2613.
[8]
T. Meade, S. Zhang, and Y. Jin, “Netlist reverse engineering for high-level functionality reconstruction,” in Asia and South Pacific Design Automation Conference (ASP-DAC), 2016, pp. 655–660.
[9]
K. S. McElvain, “Methods and apparatuses for automatic extraction of finite state machines,” U.S. Patent 6182 268, 2001.
[10]
W. Li, Z. Wasson, and S. Seshia, “Reverse engineering circuits using behavioral pattern mining,” in Hardware-Oriented Security and Trust (HOST), 2012 IEEE International Symposium on, 2012, pp. 83–88.

Cited By

View all
  • (2024)Stealing Maggie's Secrets-On the Challenges of IP Theft Through FPGA Reverse EngineeringProceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security10.1145/3658644.3690235(3391-3405)Online publication date: 2-Dec-2024
  • (2024)Security Evaluation of State Space Obfuscation of Hardware IP through a Red Team-Blue Team PracticeACM Transactions on Design Automation of Electronic Systems10.1145/364046129:3(1-18)Online publication date: 5-Mar-2024
  • (2024)REPQC: Reverse Engineering and Backdooring Hardware Accelerators for Post-quantum CryptographyProceedings of the 19th ACM Asia Conference on Computer and Communications Security10.1145/3634737.3657016(533-547)Online publication date: 1-Jul-2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Guide Proceedings
2016 IEEE International Symposium on Circuits and Systems (ISCAS)
2904 pages

Publisher

IEEE Press

Publication History

Published: 01 May 2016

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 03 Jan 2025

Other Metrics

Citations

Cited By

View all

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media