Detection and Mitigation

Don't Care Trojan#

  • What is a don't care condition in digital design?
  • Proof of concept design
    • AES implementation
    • DC conditions matter when overclocked
    • Allows for key transmission

Technique Summary#

  • Optical inspection
    • Run you run them, at a certain probability, photons will be emitted. With a sensitive sensor, you can pick up the signature
  • Invasive techniques (Destructive RE)
  • Testing-based techniques
    • Side-channel based detection
    • Run-time detection techniques
  • Design for trust

Destructive Reverse Engineering#

  • Decapsulation
  • Delayering
  • Imaging
  • Annotation
  • Schematic
    • Creation
    • Organization
    • Analysis
  • Given n chips sort TF/TI

Side-Channel-Fingerprint Technique#

  • Select a few ICs at random from a batch
    • Mask and fab match
  • Check for side-channel behavior
    • Power
    • EM Radiation
    • Thermal Emissions
  • Design a side-channel fingerprint
  • Destructively test the chips
  • Verify all other devices based on fingerprint

Formal Approaches#

  • Identifying suspicious signals with formal verification
  • Formal verification
  • Coverage analysis
  • Removing redundant circuit
  • Sequential automatic test pattern generation (ATPG)
  • Equivalence Theorems
Last updated on