Quantitative Information Flow for Hardware: Advancing the Attack Landscape
Author
Abstract

Security still remains an afterthought in modern Electronic Design Automation (EDA) tools, which solely focus on enhancing performance and reducing the chip size. Typically, the security analysis is conducted by hand, leading to vulnerabilities in the design remaining unnoticed. Security-aware EDA tools assist the designer in the identification and removal of security threats while keeping performance and area in mind. Stateof-the-art approaches utilize information flow analysis to spot unintended information leakages in design structures. However, the classification of such threats is binary, resulting in negligible leakages being listed as well. A novel quantitative analysis allows the application of a metric to determine a numeric value for a leakage. Nonetheless, current approximations to quantify the leakage are still prone to overlooking leakages. The mathematical model 2D-QModel introduced in this work aims to overcome this shortcoming. Additionally, as previous work only includes a limited threat model, multiple threat models can be applied using the provided approach. Open-source benchmarks are used to show the capabilities of 2D-QModel to identify hardware Trojans in the design while ignoring insignificant leakages.

Year of Publication
2023
Date Published
feb
Publisher
IEEE
Conference Location
Quito, Ecuador
ISBN Number
978-1-66545-705-7
URL
https://ieeexplore.ieee.org/document/10108235/
DOI
10.1109/LASCAS56464.2023.10108235
Google Scholar | BibTeX | DOI