Paper 2022/516
zk-Sherlock: Exposing Hardware Trojans in Zero-Knowledge
Abstract
As integrated circuit (IC) design and manufacturing have become highly globalized, hardware security risks become more prominent as malicious parties can exploit multiple stages of the supply chain for profit. Two potential targets in this chain are third-party intellectual property (3PIP) vendors and their customers. Untrusted parties can insert hardware Trojans into 3PIP circuit designs that can both alter device functionalities when triggered or create a side channel to leak sensitive information such as cryptographic keys. To mitigate this risk, the absence of Trojans in 3PIP designs should be verified before integration, imposing a major challenge for vendors who have to argue their IPs are safe to use, while also maintaining the privacy of their designs before ownership is transferred. To achieve this goal, in this work we employ modern cryptographic protocols for zero-knowledge proofs and enable 3PIP vendors prove an IP design is free of Trojan triggers without disclosing the corresponding netlist. Our approach uses a specialized circuit compiler that transforms arbitrary netlists into a zero-knowledge-friendly format, and introduces a versatile Trojan detection module that maintains the privacy of the actual netlist. We evaluate the effectiveness of our methodology using selected benchmarks.
Note: This work is presented at the 2022 IEEE Computer Society Annual Symposium on VLSI.
Metadata
- Available format(s)
- Category
- Applications
- Publication info
- Published elsewhere. 2022 IEEE Computer Society Annual Symposium on VLSI (ISVLSI)
- DOI
- 10.1109/ISVLSI54635.2022.00042
- Keywords
- Verifiable computationZero knowledgeTrustworthy hardwareHardware Trojans
- Contact author(s)
-
jimouris @ udel edu
cgouert @ udel edu
tsoutsos @ udel edu - History
- 2023-08-21: revised
- 2022-05-02: received
- See all versions
- Short URL
- https://ia.cr/2022/516
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2022/516, author = {Dimitris Mouris and Charles Gouert and Nektarios Georgios Tsoutsos}, title = {zk-Sherlock: Exposing Hardware Trojans in Zero-Knowledge}, howpublished = {Cryptology {ePrint} Archive, Paper 2022/516}, year = {2022}, doi = {10.1109/ISVLSI54635.2022.00042}, url = {https://eprint.iacr.org/2022/516} }