WordRev: Finding word-level structures in a sea of bit-level gates

Wenchao Li, Adria Gascon, Pramod Subramanyan, Wei Yang Tan, Ashish Tiwari, Sharad Malik, Natarajan Shankar, Sanjit A. Seshia

Research output: Chapter in Book/Report/Conference proceedingConference contribution

32 Scopus citations

Abstract

Systems are increasingly being constructed from off-the-shelf components acquired through a globally distributed and untrusted supply chain. Often only post-synthesis gate-level netlists or actual silicons are available for security inspection. This makes reasoning about hardware trojans particularly challenging given the enormous scale of the problem. Currently, there is no mature methodology that can provide visibility into a bit-level design in terms of high-level components to allow more comprehensive analysis. In this paper, we present a systemic way of automatically deriving word-level structures from the gate-level netlist of a digital circuit. Our framework also provides the possibility for a user to specify sequences of word-level operations and it can extract the collection of gates corresponding to those operations. We demonstrate the effectiveness of our approach on a system-on-a-chip (SoC) design consisting of approximately 400,000 IBM 12SOI cells and several open-source designs.

Original languageEnglish (US)
Title of host publicationProceedings of the 2013 IEEE International Symposium on Hardware-Oriented Security and Trust, HOST 2013
Pages67-74
Number of pages8
DOIs
StatePublished - 2013
Event2013 6th IEEE International Symposium on Hardware-Oriented Security and Trust, HOST 2013 - Austin, TX, United States
Duration: Jun 2 2013Jun 3 2013

Publication series

NameProceedings of the 2013 IEEE International Symposium on Hardware-Oriented Security and Trust, HOST 2013

Other

Other2013 6th IEEE International Symposium on Hardware-Oriented Security and Trust, HOST 2013
CountryUnited States
CityAustin, TX
Period6/2/136/3/13

All Science Journal Classification (ASJC) codes

  • Hardware and Architecture

Fingerprint Dive into the research topics of 'WordRev: Finding word-level structures in a sea of bit-level gates'. Together they form a unique fingerprint.

  • Cite this

    Li, W., Gascon, A., Subramanyan, P., Tan, W. Y., Tiwari, A., Malik, S., Shankar, N., & Seshia, S. A. (2013). WordRev: Finding word-level structures in a sea of bit-level gates. In Proceedings of the 2013 IEEE International Symposium on Hardware-Oriented Security and Trust, HOST 2013 (pp. 67-74). [6581568] (Proceedings of the 2013 IEEE International Symposium on Hardware-Oriented Security and Trust, HOST 2013). https://doi.org/10.1109/HST.2013.6581568