@inproceedings{41a6cce7f0174c37b9e905f87cf99fe0,
title = "WordRev: Finding word-level structures in a sea of bit-level gates",
abstract = "Systems are increasingly being constructed from off-the-shelf components acquired through a globally distributed and untrusted supply chain. Often only post-synthesis gate-level netlists or actual silicons are available for security inspection. This makes reasoning about hardware trojans particularly challenging given the enormous scale of the problem. Currently, there is no mature methodology that can provide visibility into a bit-level design in terms of high-level components to allow more comprehensive analysis. In this paper, we present a systemic way of automatically deriving word-level structures from the gate-level netlist of a digital circuit. Our framework also provides the possibility for a user to specify sequences of word-level operations and it can extract the collection of gates corresponding to those operations. We demonstrate the effectiveness of our approach on a system-on-a-chip (SoC) design consisting of approximately 400,000 IBM 12SOI cells and several open-source designs.",
author = "Wenchao Li and Adria Gascon and Pramod Subramanyan and Tan, {Wei Yang} and Ashish Tiwari and Sharad Malik and Natarajan Shankar and Seshia, {Sanjit A.}",
year = "2013",
doi = "10.1109/HST.2013.6581568",
language = "English (US)",
isbn = "9781479906000",
series = "Proceedings of the 2013 IEEE International Symposium on Hardware-Oriented Security and Trust, HOST 2013",
pages = "67--74",
booktitle = "Proceedings of the 2013 IEEE International Symposium on Hardware-Oriented Security and Trust, HOST 2013",
note = "2013 6th IEEE International Symposium on Hardware-Oriented Security and Trust, HOST 2013 ; Conference date: 02-06-2013 Through 03-06-2013",
}