Don't Care Trojan#
- What is a don't care condition in digital design?
- Proof of concept design
- AES implementation
- DC conditions matter when overclocked
- Allows for key transmission
Technique Summary#
- Optical inspection
- Run you run them, at a certain probability, photons will be emitted. With a sensitive sensor, you can pick up the signature
- Invasive techniques (Destructive RE)
- Testing-based techniques
- Side-channel based detection
- Run-time detection techniques
- Design for trust
Destructive Reverse Engineering#
- Decapsulation
- Delayering
- Imaging
- Annotation
- Schematic
- Creation
- Organization
- Analysis
- Given n chips sort TF/TI
Side-Channel-Fingerprint Technique#
- Select a few ICs at random from a batch
- Check for side-channel behavior
- Power
- EM Radiation
- Thermal Emissions
- Design a side-channel fingerprint
- Destructively test the chips
- Verify all other devices based on fingerprint
Formal Approaches#
- Identifying suspicious signals with formal verification
- Formal verification
- Coverage analysis
- Removing redundant circuit
- Sequential automatic test pattern generation (ATPG)
- Equivalence Theorems