Hardware IP Protection During Evaluation Using Embedded Sequential Trojan

被引:17
|
作者
Narasimhan, Seetharam [1 ]
Bhunia, Swarup [1 ]
Chakraborty, Rajat Subhra [2 ]
机构
[1] Case Western Reserve Univ, Cleveland, OH 44106 USA
[2] Indian Inst Technol, Kharagpur 721302, W Bengal, India
来源
IEEE DESIGN & TEST OF COMPUTERS | 2012年 / 29卷 / 03期
关键词
Hardware IP Protection; Hardware Trojan; IP Evaluation; IP Piracy;
D O I
10.1109/MDT.2012.2205997
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
A low-cost solution for hardware IP protection during evaluation, by embedding a hardware Trojan inside an IP in the form of a finite state machine is proposed. The Trojan disrupts the normal functional behavior of the IP on occurrence of a sequence of rare events, thereby effectively putting an expiry date on the usage of the IP. The proposed technique is based on embedding a specially crafted finite state machine (FSM), which follows the structure of a sequential hardware Trojan (SHT) in the evaluation copy of a hardware IP. An illegal SoC containing a pirated evaluation copy of an IP would cease to follow the specified functionality after the evaluation period due to the presence of a sequential Trojan, which acts like a hardware time-bomb. To prevent potential reverse engineering of the modified IP aiming to isolate the Trojan, low-overhead design obfuscation techniques are implemented. It provides a designer adequate flexibility to evaluate it, while protecting the interest of the IP vendors.
引用
收藏
页码:70 / 79
页数:10
相关论文
共 50 条
  • [1] Hardware ip protection during evaluation using embedded sequential trojan
    Dept. of Electrical Engineering and Computer Science, Case Western Reserve University, Cleveland, OH, United States
    不详
    IEEE Des Test Comput, 3 (70-79):
  • [2] Hardware Trojan Attacks in Embedded Memory
    Hoque, Tamzidul
    Wang, Xinmu
    Basak, Abhishek
    Karam, Robert
    Bhunia, Swamp
    2018 IEEE 36TH VLSI TEST SYMPOSIUM (VTS 2018), 2018,
  • [3] Hardware Trojan Attack in Embedded Memory
    Wang, Xinmu
    Hoque, Tamzidul
    Basak, Abhishek
    Karam, Robert
    Hu, Wei
    Qin, Maoyuan
    Mu, Dejun
    Bhunia, Swarup
    ACM JOURNAL ON EMERGING TECHNOLOGIES IN COMPUTING SYSTEMS, 2021, 17 (01)
  • [4] Hardware Trojan Horses in Cryptographic IP Cores
    Bhasin, Shivam
    Danger, Jean-Luc
    Guilley, Sylvain
    Xuan Thuy Ngo
    Sauvage, Laurent
    2013 10TH WORKSHOP ON FAULT DIAGNOSIS AND TOLERANCE IN CRYPTOGRAPHY (FDTC 2013), 2013, : 15 - 29
  • [5] Hardware IP Protection Using Logic Encryption and Watermarking
    Karmakar, Rajit
    Chattopadhyay, Santanu
    2020 IEEE INTERNATIONAL TEST CONFERENCE (ITC), 2020,
  • [6] Homomorphic Data Isolation for Hardware Trojan Protection
    Ibn Ziad, M. Tarek
    Alanwart, Amr
    Alkabani, Yousra
    El-Kharashi, M. Watheq
    Bedour, Hassan
    2015 IEEE COMPUTER SOCIETY ANNUAL SYMPOSIUM ON VLSI, 2015, : 131 - 136
  • [7] Hardware Trojan Protection for Third Party IPs
    Al-Anwar, Amr
    Alkabani, Yousra
    El-Kharashi, M. Watheq
    Bedour, Hassan
    16TH EUROMICRO CONFERENCE ON DIGITAL SYSTEM DESIGN (DSD 2013), 2013, : 662 - 665
  • [8] Hardware/software IP protection
    Dalpasso, M
    Bogliolo, A
    Benini, L
    37TH DESIGN AUTOMATION CONFERENCE, PROCEEDINGS 2000, 2000, : 593 - 596
  • [9] A Hardware Trojan Embedded in the Inverse Widlar Reference Generator
    Cao, Xing
    Wang, Qianqian
    Geiger, Randall L.
    Chen, Degang J.
    2015 IEEE 58TH INTERNATIONAL MIDWEST SYMPOSIUM ON CIRCUITS AND SYSTEMS (MWSCAS), 2015,
  • [10] System-level protection and hardware Trojan detection using weighted voting
    Amin, Hany A. M.
    Alkabani, Yousra
    Selim, Gamal M. I.
    JOURNAL OF ADVANCED RESEARCH, 2014, 5 (04) : 499 - 505