Font Size: a A A

Security Issues Of Outsourcing Of IC Manufacturing

Posted on:2019-07-24Degree:DoctorType:Dissertation
Country:ChinaCandidate:X T CuiFull Text:PDF
GTID:1368330566478005Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
In recent years,the chip manufacturing industry has achieved a global division of labor and transfer.According to the data from the Semiconductor Industry Association,the market share of integrated circuits(IC)in Europe and the United States has gradually decreased,and the IC market share in the Asia-Pacific region has increased year by year.The globalization of IC manufacturing is not only reflected by the global distribution of IC manufacturing markets,but also by the globalization of IC supply chains such as IC design,manufacturing,and sales,that is,different regions take different tasks according to their labor cost and technology level.The globalization of the IC supply chain has reduced the cost of maintaining a complete production line,accelerated the IC development cycle,and better catered to the rapidly growing IC market.Also in China,the domestic share of IC production is far behind the rapidly growing IC market share,which means that most of China's IC demand depends on imports.However,the globalization of the IC supply chain has led to serious security issues,that is,when any part(s)of the design,manufacturing,testing,assembly,etc of the IC development process are untrusted,the hardware Trojan and/or IP theft/piracy problems may arise.When these unreliable chips are applied to key systems such as military,financial,and medical,it results in serious security consequences.As a result,this research proposes innovative and highly effective defense mechanisms against increasingly serious hardware Trojans,IP theft and other security issues.The main contents of this article are as follows:(1)Research on hardware Trojan in traditional circuits.The Trojan circuit detection and recovery technique is proposed to ensure that tasks can be completed correctly in time,which is of great importance for real-time embedded or mission-critical systems that use untrusted IP cores.The run-time hardware Trojan detection and recovery technique consists of a detection phase and a recovery phase.Once an error is detected in the detection phase,the recovery phase can guarantee correct results.Since the technique need to bind operations to IP cores from different vendors,an integer linear programming(ILP)model is used to map the task scheduling and binding process.With the premise of ensuring security goal,the ILP minimizes the purchaseing cost of IP cores from different vendors.(2)Research on hardware Trojan in reversible circuits.This paper investigates the hardware Trojan problem in reversible circuits,and explores the detection and defense method of hardware Trojans in reversible circuits.First,we analyze the differences between hardware Trojans in the reversible circuit and that in the traditional circuit as well as differences between hardware Trojans and faults in reversible circuits.Second,we propose specific test patterns to detect simple Trojan circuits.Finally,an I/O obfuscation technique is proposed for the general hardware Trojan to hinder the attacker's original goal and thus prevent the insertion of a hardware Trojan.(3)Research on IP protection.Most of the techniques for preventing IP theft/piracy are gate-level or layout-level obfuscation methods.This not only incurs significant redesign overhead,but also breaks the original optimization layout and hence generates additional performance overhead.This paper proposes two register transfer level obfuscation techniques and corresponding security metric,which are based on embedded programmable logic and split manufacturing,respectively.The proposed techniques achive dynamic trade-offs between security levels and cost overhead.The experimental results confirm that the proposed techniques can optimize the cost while achieving the security goal.The comparison to related work also proves the effectiveness of the proposed techniques.
Keywords/Search Tags:Hardware Trojan, intellectual property theft, high-level synthesis, obfuscation, reversible circuits
PDF Full Text Request
Related items