Hardware Trojan (HT) Detection in 3-D IC Wafi Danesh Instructor: Dr. Christopher Allen EECS 713 High-Speed Digital Circuit Design Final Project Presentation.

Slides:



Advertisements
Similar presentations
MonolithIC 3D Inc., Patents Pending MonolithIC 3D ICs October MonolithIC 3D Inc., Patents Pending.
Advertisements

Electrical and Computer Engineering UAH System Level Optical Interconnect Optical Fiber Computer Interconnect: The Simultaneous Multiprocessor Exchange.
Subthreshold SRAM Designs for Cryptography Security Computations Adnan Gutub The Second International Conference on Software Engineering and Computer Systems.
Copyright 2001, Agrawal & BushnellVLSI Test: Lecture 31/22alt1 Lecture 31 System Test (Lecture 22alt in the Alternative Sequence) n Definition n Functional.
Apr. 20, 2001VLSI Test: Bushnell-Agrawal/Lecture 311 Lecture 31 System Test n Definition n Functional test n Diagnostic test  Fault dictionary  Diagnostic.
Tamper Evident Microprocessors Adam Waksman Simha Sethumadhavan Computer Architecture & Security Technologies Lab (CASTL) Department of Computer Science.
Physical Unclonable Functions
EELE 367 – Logic Design Module 2 – Modern Digital Design Flow Agenda 1.History of Digital Design Approach 2.HDLs 3.Design Abstraction 4.Modern Design Steps.
National Tsing Hua University Po-Yang Hsu,Hsien-Te Chen,
PH4705 ET4305 Interface Standards A number of standard digital data interfaces are used in measurement systems to connect instruments and computers for.
WATERLOO ELECTRICAL AND COMPUTER ENGINEERING 40s: Circuits 1 WATERLOO ELECTRICAL AND COMPUTER ENGINEERING 40s Circuits Department of Electrical and Computer.
3Dsec: Trustworthy System Security through 3-D Integrated Hardware Ted Huffmire 14 January 2009.
Lecture 1 Design Hierarchy Chapter 1. Digital System Design Flow 1.Register-Transfer Levl (RTL) – e.g. VHDL/Verilog 2.Gate Level Design 3.Circuit Level.
Module 7 Hardware. Introduction Switches are the basic blocks of computer hardware. We build increasingly complex hardware from these simple switches.
Chapter 1. Introduction This course is all about how computers work But what do we mean by a computer? –Different types: desktop, servers, embedded devices.
Institute of Digital and Computer Systems 1 Fabio Garzia / Finding Peak Performance in a Process23/06/2015 Chapter 5 Finding Peak Performance in a Process.
Chapter 01 An Overview of VLSI
Low Power Design of Integrated Systems Assoc. Prof. Dimitrios Soudris
Emerging Technologies – A Critical Review Presenter: Qufei Wu 12/05/05.
EKT 221 Digital Electronics II
1 Daniel Micheletti Darren Allen Daniel Mazo Jon Lamb Lyle Johnson Pixel Perfect WiCam: A Wireless Digital Camera Presented by : Kyle Swenson.
Technology For Realizing 3D Integration By-Dipyaman Modak.
Application of through-silicon-via (TSV) technology to making of high-resolution CMOS image sensors Name: Qian YU Student ID:
Presentation for Advanced VLSI Course presented by:Shahab adin Rahmanian Instructor:Dr S. M.Fakhraie Major reference: 3D Interconnection and Packaging:
Hardware Support for Trustworthy Systems Ted Huffmire ACACES 2012 Fiuggi, Italy.
Slide: 1International Conference on Electronics, Circuits, and Systems 2010 Department of Electrical and Computer Engineering University of New Mexico.
Power Reduction for FPGA using Multiple Vdd/Vth
Basic LAN techniques IN common with all other computer based systems networks require both HARDWARE and SOFTWARE to function. Networks are often explained.
TEMPLATE DESIGN © Gate-Diffusion Input (GDI) Technique for Low Power CMOS Logic Circuits Design Yerkebulan Saparov, Aktanberdi.
Intro to Architecture – Page 1 of 22CSCI 4717 – Computer Architecture CSCI 4717/5717 Computer Architecture Topic: Introduction Reading: Chapter 1.
Architectures for mobile and wireless systems Ese 566 Report 1 Hui Zhang Preethi Karthik.
EKT 221 : Digital 2 Memory Basics
Paper Review: XiSystem - A Reconfigurable Processor and System
SoC TAM Design to Minimize Test Application Time Advisor Dr. Vishwani D. Agrawal Committee Members Dr. Victor P. Nelson, Dr. Adit D. Singh Apr 9, 2015.
Abhishek Pandey Reconfigurable Computing ECE 506.
1 UCR Hardware Security Primitives with focus on PUFs Slide credit: Srini Devedas and others.
A Sensor-Assisted Self-Authentication for Hardware Trojan Detection Min Li*, Azadeh Davoodi*, Mohammad Tehranipoor** * University of Wisconsin-Madison.
3DCoB: A new design approach for Monolithic 3D Integrated Circuits H. Sarhan, S. Thuries, O. Billoint and F. Clermidy CEA-LETI, Minatec Campus, France.
EE/CS 481 Spring Founder’s Day, 2008 University of Portland School of Engineering Project Golden Eagle CMOS Fast Fourier Transform Processor Team.
Ho-Lin Chang, Hsiang-Cheng Lai, Tsu-Yun Hsueh, Wei-Kai Cheng, Mely Chen Chi Department of Information and Computer Engineering, CYCU A 3D IC Designs Partitioning.
1 System-on-Chip (SoC) Testing An Introduction and Overview of IEEE 1500 Standard Testability Method for Embedded Core-based ICs.
Module Development Plan I believe that we are ready to proceed to a program to demonstrate a PS module based on “2.5 D” interconnections. This is based.
Background: VLSI Courses at Lafayette  ECE VLSI Circuit Design  Original form: “tall thin designer”  VLSI Processing  CMOS Transistor Characteristics.
Hardware Security: An Emerging Threat Landscape and Possible Solutions
Azam Supervisor : Prof. Raj Jain
Uniformly-switching Logic for Cryptographic Hardware D. Maslov - University of Victoria, Canada I. L. Markov - University of Michigan, USA.
Lecture 1 – Overview (rSp06) ©2008 Joanne DeGroat, ECE, OSU -1- Functional Verification of Hardware Designs EE764 – Functional Verification of Hardware.
CONTENTS: 1.Abstract. 2.Objective. 3.Block diagram. 4.Methodology. 5.Advantages and Disadvantages. 6.Applications. 7.Conclusion.
Overview of VLSI 魏凱城 彰化師範大學資工系. VLSI  Very-Large-Scale Integration Today’s complex VLSI chips  The number of transistors has exceeded 120 million 
A Design Flow for Optimal Circuit Design Using Resource and Timing Estimation Farnaz Gharibian and Kenneth B. Kent {f.gharibian, unb.ca Faculty.
A4 1 Barto "Sequential Circuit Design for Space-borne and Critical Electronics" Dr. Rod L. Barto Spacecraft Digital Electronics Richard B. Katz NASA Goddard.
Slide 1/20 Defending Against Strategic Adversaries in Dynamic Pricing Markets for Smart Grids Paul Wood, Saurabh Bagchi Purdue University
Electrical Characteristics of Logic Gates Gate Characteristics Last Mod: January 2008  Paul R. Godin.
Security and Trust Issues in 3D ICs Soha Alhelaly Advisor Prof. Jennifer Dworak
Custom ICs for Radiation Detection & Imaging
MAPLD 2005/213Kakarla & Katkoori Partial Evaluation Based Redundancy for SEU Mitigation in Combinational Circuits MAPLD 2005 Sujana Kakarla Srinivas Katkoori.
Overview on Hardware Security
REMOTE JAMMING DEVICE.
ASAP The 28th Annual IEEE International Conference on Application-specific Systems, Architectures and Processors July 10th-12th 2017, Seattle, WA,
Chapter 4 Gates and Circuits.
Hardware Trojans: The Hidden Malicious Insider
CS105 Introduction to Computer Concepts GATES and CIRCUITS
Overview of VLSI 魏凱城 彰化師範大學資工系.
Protect Your Hardware from Hacking and Theft
EVLA MONITOR & CONTROL CDR
Chapter 1 Introduction.
Hardware Trojan Detection
1.Introduction to Advanced Digital Design (14 marks)
Digital Electronics and Logic Circuit
Semiconductor memories are classified in different ways. A distinction is made between read-only (ROM) and read-write (RWM) memories. The contents RWMs.
Presentation transcript:

Hardware Trojan (HT) Detection in 3-D IC Wafi Danesh Instructor: Dr. Christopher Allen EECS 713 High-Speed Digital Circuit Design Final Project Presentation 1

Outline  Why is Hardware Trojan (HT) a major concern ?  Hardware Trojan (HT) Classification and Detection  Introduction to 3-D IC  HT Detection in 3-D IC 2

Outline  Why is Hardware Trojan (HT) a major concern ?  Hardware Trojan (HT) Classification and Detection  Introduction to 3-D IC  HT Detection in 3-D IC 3

Outsourcing Chip Manufacturing  Modern fabrication facility is costly $4.6 billion, Global Foundries, Fab 8, 2012 [1] $7 billion, Intel, upgrading 7 facilities, 2009 [2]  Outsourcing fabrication is preferred 4 [1] [2]

 Outsourcing brings in potential chip safety issues  Each stage designated to different companies make malicious insertions insert counterfeit parts modify design specification  Real-life reports: Counterfeit part reports increased by factor of 700, iSupply report Feb. 24, cases of counterfeit parts over 2 year survey, Congressional hearing Nov. 8, Supply chain Source: Security Challenge from Outsourcing

Outline  Why is Hardware Trojan (HT) a major concern ?  Hardware Trojan (HT) Classification and Detection  Introduction to 3-D IC  HT Detection in 3-D IC 6

HT Definition Extra circuitry added to specified design can cause malfunction steal secret information create backdoor for attack Architecture divided into two parts: Trigger, activates the HT Payload, delivers the malicious effect 7

HT Classification 8 M. Tehranipoor and F. Koushanfar, IEEE Design & Test of Computers, 2010

Example of HT Effect Combinational triggered HT Triggered Modified output 0 AND gate (trigger) XOR gate (Payload) Original output

Example of HT Effect (continued) Sequential triggered HT 10 RS-232 transmitter module Hardware Trojan 2400 bits/second 32-bit trigger Trigger probability = 1/2^32 Time to trigger = days

HT Detection 11 J. Francq and F. Frick, ECCTD, 2015

Outline  Why is Hardware Trojan (HT) a major concern ?  Hardware Trojan (HT) Classification and Detection  Introduction to 3-D IC  HT Detection in 3-D IC 12

What is a 3D IC?  Chip consisting of multiple “tiers” of thinned-active 2D ICs  “Tiers” are layers that are stacked, bonded, and electrically connected  Connection made using “Through-Silicon-Vias (TSVs)” or “posts”  Frequency of connections is user-defined and application specific 13

Generic architecture of 3D IC 14 Development process of a 3-D ICExample of a fabricated 3-D IC, a ring oscillator circuit Three Dimensional System Integration, A Papanikolaou, 2010

Benefits and Drawbacks  Advantages of 3D IC for HT detection:  Heterogeneous Integration  Small form factor  Reduced power consumption  Decrease in overall cost of fabrication  Disadvantages:  Additional process steps for TSV  Higher operating temperature  Mechanical stability  Vendor interfaces  Standardization 15

Outline  Why is Hardware Trojan (HT) a major concern ?  Hardware Trojan (HT) Classification and Detection  Introduction to 3-D IC  HT Detection in 3-D IC 16

HT Detection Methods in 3-D IC  Heterogeneous mix of ICs stacked vertically in standard 3-D IC die  Each IC can be fabricated from a different vendor  The process is a type of “Split Manufacture”  Aim is to prevent attacker from having a complete picture of IC design  Critical functionality fabricated by a trusted foundry while less “security intensive” functionality shipped out to untrusted foundry 17

Integration of 3-D Control Plane  Initial proposed method:  Computation plane shipped to untrusted foundry whereas 3-D control plane fabricated in trusted foundry  “Posts” tap required signals needed for security logic  “Sleep transistors” reroute, override, or disable lines on the computation plane.  Computation plane thus monitored from 3-D computation plane 18 J. Valamehr et. al, ACSAC, 2010

Hardware Obfuscation  Aim is to obscure the connections in the IC netlist to the attacker:  Fabrication divided into two tiers: bottom tier, fabricated by untrusted foundry and top tier, fabricated by trusted foundry  Neltist is split among the two tiers  Attacker has access to the bottom tier  The attack has to be random as gates in bottom tier are indistinguishable  Attack will also require larger overhead of HT risking detection 19 F. Imeson et. al, USENIX, 2013

Hardware Obfuscation Example  Example is of Virtex T  Bottom tier, contains active CMOS transistors, expensive to fabricate and outsourced  Upper tier, called “interposer”, has additional connections for digital logic gates on the bottom tier 20 F. Imeson et. al, USENIX, 2013

Security-Aware 2.5D IC Design  Original netlist split into 3 partitions:  2 sub-netlists detailing the logic gates involved in the IC functionality  Interposer layer containing all connections in the netlists  Attacker cannot determine the success of attack due to obfuscation  Layout is also obfuscated in order to deter layout based attacks 21 Y. Xie et. al, ACM, 2015

22 THANK YOU!!! QUESTIONS?

References 1.Tehranipoor, Mohammad, and Farinaz Koushanfar. "A survey of hardware Trojan taxonomy and detection." (2010). 2.Francq, Julien, and Florian Frick. "Overview of hardware trojan detection and prevention methods." Circuit Theory and Design (ECCTD), 2015 European Conference on. IEEE, Papanikolaou, Antonis, Dimitrios Soudris, and Riko Radojcic. Three dimensional system integration: IC stacking process and design. Springer Science & Business Media, Valamehr, Jonathan, et al. "Hardware assistance for trustworthy systems through 3-D integration." Proceedings of the 26th Annual Computer Security Applications Conference. ACM, Imeson, Frank, et al. "Securing Computer Hardware Using 3D Integrated Circuit (IC) Technology and Split Manufacturing for Obfuscation." USENIX Security. Vol

References 6. Xie, Yang, Chongxi Bao, and Ankur Srivastava. "Security-Aware Design Flow for 2.5 D IC Technology." Proceedings of the 5th International Workshop on Trustworthy Embedded Devices. ACM,