WordRev

Finding word-level structures in a sea of bit-level gates

Wenchao Li, Adria Gascon, Pramod Subramanyan, Wei Yang Tan, Ashish Tiwari, Sharad Malik, Natarajan Shankar, Sanjit A. Seshia

Research output: Chapter in Book/Report/Conference proceedingConference contribution

27 Citations (Scopus)

Abstract

Systems are increasingly being constructed from off-the-shelf components acquired through a globally distributed and untrusted supply chain. Often only post-synthesis gate-level netlists or actual silicons are available for security inspection. This makes reasoning about hardware trojans particularly challenging given the enormous scale of the problem. Currently, there is no mature methodology that can provide visibility into a bit-level design in terms of high-level components to allow more comprehensive analysis. In this paper, we present a systemic way of automatically deriving word-level structures from the gate-level netlist of a digital circuit. Our framework also provides the possibility for a user to specify sequences of word-level operations and it can extract the collection of gates corresponding to those operations. We demonstrate the effectiveness of our approach on a system-on-a-chip (SoC) design consisting of approximately 400,000 IBM 12SOI cells and several open-source designs.

Original languageEnglish (US)
Title of host publicationProceedings of the 2013 IEEE International Symposium on Hardware-Oriented Security and Trust, HOST 2013
Pages67-74
Number of pages8
DOIs
StatePublished - Sep 16 2013
Event2013 6th IEEE International Symposium on Hardware-Oriented Security and Trust, HOST 2013 - Austin, TX, United States
Duration: Jun 2 2013Jun 3 2013

Publication series

NameProceedings of the 2013 IEEE International Symposium on Hardware-Oriented Security and Trust, HOST 2013

Other

Other2013 6th IEEE International Symposium on Hardware-Oriented Security and Trust, HOST 2013
CountryUnited States
CityAustin, TX
Period6/2/136/3/13

Fingerprint

Digital circuits
Visibility
Supply chains
Inspection
Hardware
Silicon

All Science Journal Classification (ASJC) codes

  • Hardware and Architecture

Cite this

Li, W., Gascon, A., Subramanyan, P., Tan, W. Y., Tiwari, A., Malik, S., ... Seshia, S. A. (2013). WordRev: Finding word-level structures in a sea of bit-level gates. In Proceedings of the 2013 IEEE International Symposium on Hardware-Oriented Security and Trust, HOST 2013 (pp. 67-74). [6581568] (Proceedings of the 2013 IEEE International Symposium on Hardware-Oriented Security and Trust, HOST 2013). https://doi.org/10.1109/HST.2013.6581568
Li, Wenchao ; Gascon, Adria ; Subramanyan, Pramod ; Tan, Wei Yang ; Tiwari, Ashish ; Malik, Sharad ; Shankar, Natarajan ; Seshia, Sanjit A. / WordRev : Finding word-level structures in a sea of bit-level gates. Proceedings of the 2013 IEEE International Symposium on Hardware-Oriented Security and Trust, HOST 2013. 2013. pp. 67-74 (Proceedings of the 2013 IEEE International Symposium on Hardware-Oriented Security and Trust, HOST 2013).
@inproceedings{79693955ee454cdcb2bc28505723bcd9,
title = "WordRev: Finding word-level structures in a sea of bit-level gates",
abstract = "Systems are increasingly being constructed from off-the-shelf components acquired through a globally distributed and untrusted supply chain. Often only post-synthesis gate-level netlists or actual silicons are available for security inspection. This makes reasoning about hardware trojans particularly challenging given the enormous scale of the problem. Currently, there is no mature methodology that can provide visibility into a bit-level design in terms of high-level components to allow more comprehensive analysis. In this paper, we present a systemic way of automatically deriving word-level structures from the gate-level netlist of a digital circuit. Our framework also provides the possibility for a user to specify sequences of word-level operations and it can extract the collection of gates corresponding to those operations. We demonstrate the effectiveness of our approach on a system-on-a-chip (SoC) design consisting of approximately 400,000 IBM 12SOI cells and several open-source designs.",
author = "Wenchao Li and Adria Gascon and Pramod Subramanyan and Tan, {Wei Yang} and Ashish Tiwari and Sharad Malik and Natarajan Shankar and Seshia, {Sanjit A.}",
year = "2013",
month = "9",
day = "16",
doi = "https://doi.org/10.1109/HST.2013.6581568",
language = "English (US)",
isbn = "9781479906000",
series = "Proceedings of the 2013 IEEE International Symposium on Hardware-Oriented Security and Trust, HOST 2013",
pages = "67--74",
booktitle = "Proceedings of the 2013 IEEE International Symposium on Hardware-Oriented Security and Trust, HOST 2013",

}

Li, W, Gascon, A, Subramanyan, P, Tan, WY, Tiwari, A, Malik, S, Shankar, N & Seshia, SA 2013, WordRev: Finding word-level structures in a sea of bit-level gates. in Proceedings of the 2013 IEEE International Symposium on Hardware-Oriented Security and Trust, HOST 2013., 6581568, Proceedings of the 2013 IEEE International Symposium on Hardware-Oriented Security and Trust, HOST 2013, pp. 67-74, 2013 6th IEEE International Symposium on Hardware-Oriented Security and Trust, HOST 2013, Austin, TX, United States, 6/2/13. https://doi.org/10.1109/HST.2013.6581568

WordRev : Finding word-level structures in a sea of bit-level gates. / Li, Wenchao; Gascon, Adria; Subramanyan, Pramod; Tan, Wei Yang; Tiwari, Ashish; Malik, Sharad; Shankar, Natarajan; Seshia, Sanjit A.

Proceedings of the 2013 IEEE International Symposium on Hardware-Oriented Security and Trust, HOST 2013. 2013. p. 67-74 6581568 (Proceedings of the 2013 IEEE International Symposium on Hardware-Oriented Security and Trust, HOST 2013).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

TY - GEN

T1 - WordRev

T2 - Finding word-level structures in a sea of bit-level gates

AU - Li, Wenchao

AU - Gascon, Adria

AU - Subramanyan, Pramod

AU - Tan, Wei Yang

AU - Tiwari, Ashish

AU - Malik, Sharad

AU - Shankar, Natarajan

AU - Seshia, Sanjit A.

PY - 2013/9/16

Y1 - 2013/9/16

N2 - Systems are increasingly being constructed from off-the-shelf components acquired through a globally distributed and untrusted supply chain. Often only post-synthesis gate-level netlists or actual silicons are available for security inspection. This makes reasoning about hardware trojans particularly challenging given the enormous scale of the problem. Currently, there is no mature methodology that can provide visibility into a bit-level design in terms of high-level components to allow more comprehensive analysis. In this paper, we present a systemic way of automatically deriving word-level structures from the gate-level netlist of a digital circuit. Our framework also provides the possibility for a user to specify sequences of word-level operations and it can extract the collection of gates corresponding to those operations. We demonstrate the effectiveness of our approach on a system-on-a-chip (SoC) design consisting of approximately 400,000 IBM 12SOI cells and several open-source designs.

AB - Systems are increasingly being constructed from off-the-shelf components acquired through a globally distributed and untrusted supply chain. Often only post-synthesis gate-level netlists or actual silicons are available for security inspection. This makes reasoning about hardware trojans particularly challenging given the enormous scale of the problem. Currently, there is no mature methodology that can provide visibility into a bit-level design in terms of high-level components to allow more comprehensive analysis. In this paper, we present a systemic way of automatically deriving word-level structures from the gate-level netlist of a digital circuit. Our framework also provides the possibility for a user to specify sequences of word-level operations and it can extract the collection of gates corresponding to those operations. We demonstrate the effectiveness of our approach on a system-on-a-chip (SoC) design consisting of approximately 400,000 IBM 12SOI cells and several open-source designs.

UR - http://www.scopus.com/inward/record.url?scp=84883692373&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84883692373&partnerID=8YFLogxK

U2 - https://doi.org/10.1109/HST.2013.6581568

DO - https://doi.org/10.1109/HST.2013.6581568

M3 - Conference contribution

SN - 9781479906000

T3 - Proceedings of the 2013 IEEE International Symposium on Hardware-Oriented Security and Trust, HOST 2013

SP - 67

EP - 74

BT - Proceedings of the 2013 IEEE International Symposium on Hardware-Oriented Security and Trust, HOST 2013

ER -

Li W, Gascon A, Subramanyan P, Tan WY, Tiwari A, Malik S et al. WordRev: Finding word-level structures in a sea of bit-level gates. In Proceedings of the 2013 IEEE International Symposium on Hardware-Oriented Security and Trust, HOST 2013. 2013. p. 67-74. 6581568. (Proceedings of the 2013 IEEE International Symposium on Hardware-Oriented Security and Trust, HOST 2013). https://doi.org/10.1109/HST.2013.6581568