TroLLoc: Logic Locking and Layout Hardening for IC Security Closure against Hardware Trojans

Fangzhou Wang,Qijing Wang,Lilas Alrahis,Bangqi Fu,Shui Jiang,Xiaopeng Zhang,Ozgur Sinanoglu,Tsung-Yi Ho,Evangeline F.Y. Young,Johann Knechtel
2024-05-09
Abstract:Due to cost benefits, supply chains of integrated circuits (ICs) are largely outsourced nowadays. However, passing ICs through various third-party providers gives rise to many security threats, like piracy of IC intellectual property or insertion of hardware Trojans, i.e., malicious circuit modifications.
Cryptography and Security,Hardware Architecture,Machine Learning
What problem does this paper attempt to address?
This paper aims to address the security threats faced in the integrated circuit (IC) design and manufacturing processes, especially the problem of hardware Trojan insertion. With the outsourcing of the IC supply chain, third - party suppliers may maliciously insert Trojans after the design is completed, thus causing serious damage to the IC's intellectual property (IP) or functionality. ### Specific problems the paper attempts to solve include: 1. **Preventing hardware Trojan insertion**: - Trojans are malicious circuit modifications that can be introduced by different types of attackers at different stages of the IC supply chain. These Trojans are usually small but have serious consequences. - The authors propose a new scheme - **TroLLoc**, which combines logic locking and layout hardening to systematically protect the IC physical layout from post - design Trojan insertion. 2. **Robustness against advanced attacks**: - **Second - order attacks**: Attackers may first try to bypass existing defenses (such as through advanced machine - learning attacks) and then insert Trojans. Existing methods are insufficient in this regard. - The paper shows that TroLLoc can effectively resist such complex second - order attacks. 3. **Improving the effectiveness and efficiency of defenses**: - **Effectiveness**: Defenses should be able to resist all types of Trojans and should be evaluated in actual layout - level Trojan insertions, not just based on vulnerability estimates. - **Efficiency**: Defenses should minimize design overheads (such as area, power consumption, performance, etc.). To this end, the relationship between security and overhead needs to be balanced. 4. **Full integration into commercial - level design processes**: - TroLLoc is fully integrated into a commercial - level physical synthesis setup, ensuring its feasibility and practicality in actual IC design and manufacturing. ### Main contributions: 1. **Layout - level logic locking**: A new locking scheme, TroLLoc, is proposed specifically to prevent post - design Trojan insertion. 2. **IC security closure process**: An EDA process is designed for security closure during design to prevent post - design Trojan insertion. 3. **Layout and security analysis**: The effectiveness of TroLLoc is verified through in - depth analysis of benchmarks in the ISPD’22/23 competitions. 4. **Open - source release**: All relevant layouts and code are released for independent verification. In conclusion, this paper provides a robust, effective, and efficient solution to prevent post - design Trojan insertion in IC design by introducing the TroLLoc scheme and combines logic locking and layout hardening techniques for the first time.