Hardware IP Protection During Evaluation Using Embedded Sequential Trojan

被引:17
|
作者
Narasimhan, Seetharam [1 ]
Bhunia, Swarup [1 ]
Chakraborty, Rajat Subhra [2 ]
机构
[1] Case Western Reserve Univ, Cleveland, OH 44106 USA
[2] Indian Inst Technol, Kharagpur 721302, W Bengal, India
来源
IEEE DESIGN & TEST OF COMPUTERS | 2012年 / 29卷 / 03期
关键词
Hardware IP Protection; Hardware Trojan; IP Evaluation; IP Piracy;
D O I
10.1109/MDT.2012.2205997
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
A low-cost solution for hardware IP protection during evaluation, by embedding a hardware Trojan inside an IP in the form of a finite state machine is proposed. The Trojan disrupts the normal functional behavior of the IP on occurrence of a sequence of rare events, thereby effectively putting an expiry date on the usage of the IP. The proposed technique is based on embedding a specially crafted finite state machine (FSM), which follows the structure of a sequential hardware Trojan (SHT) in the evaluation copy of a hardware IP. An illegal SoC containing a pirated evaluation copy of an IP would cease to follow the specified functionality after the evaluation period due to the presence of a sequential Trojan, which acts like a hardware time-bomb. To prevent potential reverse engineering of the modified IP aiming to isolate the Trojan, low-overhead design obfuscation techniques are implemented. It provides a designer adequate flexibility to evaluate it, while protecting the interest of the IP vendors.
引用
收藏
页码:70 / 79
页数:10
相关论文
共 50 条
  • [31] Hardware IP protection by exploiting IP vendor’s proteogenomic BioMarker as digital watermark during behavioral synthesis
    Anirban Sengupta
    Nabendu Bhui
    Vishal Chourasia
    Scientific Reports, 15 (1)
  • [32] Graph Features Analysis and Detection Method of IP Soft Core Hardware Trojan
    Ni, Lin
    Li, Lin
    Zhang, Shuai
    Tong, Sicheng
    Qian, Yang
    Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2024, 46 (11): : 4151 - 4160
  • [33] Hardware Trojan Detection using FBHT in FPGAs
    Qayyum, Sundus
    Qureshi, Kashif Naseer
    Bashir, Faisal
    Ul Islam, Najam
    Malik, Nazir
    PROCEEDINGS OF 2020 17TH INTERNATIONAL BHURBAN CONFERENCE ON APPLIED SCIENCES AND TECHNOLOGY (IBCAST), 2020, : 422 - 427
  • [34] Hardware Trojan prevention using memristor technology
    Supon, Tareq Muhammad
    Rashidzadeh, Rashid
    MICROPROCESSORS AND MICROSYSTEMS, 2023, 102
  • [35] Hardware Trojan Insertion Using Reinforcement Learning
    Sarihi, Amin
    Patooghy, Ahmad
    Jamieson, Peter
    Badawy, Abdel-Hameed A.
    PROCEEDINGS OF THE 32ND GREAT LAKES SYMPOSIUM ON VLSI 2022, GLSVLSI 2022, 2022, : 139 - 142
  • [36] Hardware Trojan Detection using Xilinx Vivado
    Marlow, Ryan
    Harper, Scott
    Batchelor, Whitney
    Graf, Jonathan
    NAECON 2018 - IEEE NATIONAL AEROSPACE AND ELECTRONICS CONFERENCE, 2018, : 86 - 91
  • [37] A study on hardware-in-loop simulation with embedded controllers using TCP/IP and UDP
    Banerjee, Abhisek
    Das, Monotosh
    Ghosh, Ratna
    Goswami, Bhaswati
    Chandra, A. K.
    Balasubramanian, R.
    Gupta, Amitava
    3RD INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATIONS AND CONTROL TECHNOLOGIES, VOL 3, PROCEEDINGS, 2005, : 103 - 108
  • [38] A Multi-Layer Hardware Trojan Protection Framework for IoT Chips
    Dong, Chen
    He, Guorong
    Liu, Ximeng
    Yang, Yang
    Guo, Wenzhong
    IEEE ACCESS, 2019, 7 : 23628 - 23639
  • [39] Surviving Information Leakage Hardware Trojan Attacks Using Hardware Isolation
    Hu, Nianhang
    Ye, Mengmei
    Wei, Sheng
    IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2019, 7 (02) : 253 - 261
  • [40] Runtime Trust Evaluation and Hardware Trojan Detection Using On-Chip EM Sensors
    He, Jiaji
    Guo, Xiaolong
    Ma, Haocheng
    Liu, Yanjiang
    Zhao, Yiqiang
    Jin, Yier
    PROCEEDINGS OF THE 2020 57TH ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2020,