Proj CMI Paper Reading: Developing Trustworthy Hardware with Security-Driven Design and Verification
Abstract
背景:1. 集成电路可能需要为了特定程序优化
2. 由于集成电路比较复杂,寄存器传输级Register-Transfer Level (RTL)设计的外包更为常见
we must trust our ICs have been designed and fabricated to specification, i.e., they do not contain any hardware Trojans
本文任务:
- 研究外包导致的威胁ICAS: 量化IC布局安全性的框架。 效果:现代集成电路留下了许多布局和电路资源来被攻击
- 以路由为中⼼的防御制造时特洛伊⽊⻢T-TER 封装security-critical interconnects关键的安全互联在带防篡改机制的布局中to prevent foundry-side attackers
- 审查不受信任的第三⽅ RTL 硬件是否存在Ticking Timebomb木马的动态验证技术 Bomberman
- 使用Coverage-guided fuzzer做RTL验证