Hardware IP Protection During Evaluation Using Embedded Sequential Trojan

被引:17
|
作者
Narasimhan, Seetharam [1 ]
Bhunia, Swarup [1 ]
Chakraborty, Rajat Subhra [2 ]
机构
[1] Case Western Reserve Univ, Cleveland, OH 44106 USA
[2] Indian Inst Technol, Kharagpur 721302, W Bengal, India
来源
IEEE DESIGN & TEST OF COMPUTERS | 2012年 / 29卷 / 03期
关键词
Hardware IP Protection; Hardware Trojan; IP Evaluation; IP Piracy;
D O I
10.1109/MDT.2012.2205997
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
A low-cost solution for hardware IP protection during evaluation, by embedding a hardware Trojan inside an IP in the form of a finite state machine is proposed. The Trojan disrupts the normal functional behavior of the IP on occurrence of a sequence of rare events, thereby effectively putting an expiry date on the usage of the IP. The proposed technique is based on embedding a specially crafted finite state machine (FSM), which follows the structure of a sequential hardware Trojan (SHT) in the evaluation copy of a hardware IP. An illegal SoC containing a pirated evaluation copy of an IP would cease to follow the specified functionality after the evaluation period due to the presence of a sequential Trojan, which acts like a hardware time-bomb. To prevent potential reverse engineering of the modified IP aiming to isolate the Trojan, low-overhead design obfuscation techniques are implemented. It provides a designer adequate flexibility to evaluate it, while protecting the interest of the IP vendors.
引用
收藏
页码:70 / 79
页数:10
相关论文
共 50 条
  • [21] A Novel Hardware Trojan Protection Technology Based on Logic Encryption
    Zhang, Yi-lun
    Yan, Ying-jian
    Li, Jun-wei
    Liu, Min
    2018 3RD IEEE INTERNATIONAL CONFERENCE ON INTEGRATED CIRCUITS AND MICROSYSTEMS (ICICM), 2018, : 396 - 400
  • [22] Evaluation on Hardware-Trojan Detection at Gate-Level IP Cores Utilizing Machine Learning Methods
    Kurihara, Tatsuki
    Hasegawa, Kento
    Togawa, Nozomu
    2020 26TH IEEE INTERNATIONAL SYMPOSIUM ON ON-LINE TESTING AND ROBUST SYSTEM DESIGN (IOLTS 2020), 2020,
  • [23] On the feasibility of using evolvable hardware for hardware Trojan detection and prevention
    Labafniya, Mansoureh
    Picek, Stjepan
    Borujeni, Shahram Etemadi
    Mentens, Nele
    APPLIED SOFT COMPUTING, 2020, 91
  • [24] Hardware Obfuscation for IP Protection of DSP Applications
    Naveenkumar, R.
    Sivamangai, N. M.
    Napolean, A.
    Nissi, G. Akashraj
    JOURNAL OF ELECTRONIC TESTING-THEORY AND APPLICATIONS, 2022, 38 (01): : 9 - 20
  • [25] Comparative Analysis of Hardware Obfuscation for IP Protection
    Amir, Sarah
    Shakya, Bicky
    Forte, Domenic
    Tehranipoor, Mark
    Bhunia, Swarup
    PROCEEDINGS OF THE GREAT LAKES SYMPOSIUM ON VLSI 2017 (GLSVLSI' 17), 2017, : 363 - 368
  • [26] Circuit Camouflage Integration for Hardware IP Protection
    Cocchi, Ronald P.
    Baukus, James P.
    Chow, Lap Wai
    Wang, Bryan J.
    2014 51ST ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2014,
  • [27] Hardware Obfuscation for IP Protection of DSP Applications
    Naveenkumar R
    N.M. Sivamangai
    Napolean A
    G. Akashraj Nissi
    Journal of Electronic Testing, 2022, 38 : 9 - 20
  • [28] Sequential Hardware Trojan: Side-channel Aware Design and Placement
    Wang, Xinmu
    Narasimhan, Seetharam
    Krishna, Aswin
    Mal-Sarkar, Tatini
    Bhunia, Swarup
    2011 IEEE 29TH INTERNATIONAL CONFERENCE ON COMPUTER DESIGN (ICCD), 2011, : 297 - 300
  • [29] Granularity and detection capability of an adaptive embedded Hardware Trojan detection system
    Lecomte, Maxime
    Fournier, Jacques J. A.
    Maurine, Philippe
    PROCEEDINGS OF THE 2016 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST), 2016, : 135 - 138
  • [30] Embedded Intelligent Camera Algorithm Based on Hardware IP
    Liu, Guodong
    Luo, Qifeng
    Liu, Bingguo
    Lu, Binghui
    Guo, Pan
    TENTH INTERNATIONAL SYMPOSIUM ON PRECISION ENGINEERING MEASUREMENTS AND INSTRUMENTATION, 2019, 11053