Hardware IP Protection During Evaluation Using Embedded Sequential Trojan

被引:17
|
作者
Narasimhan, Seetharam [1 ]
Bhunia, Swarup [1 ]
Chakraborty, Rajat Subhra [2 ]
机构
[1] Case Western Reserve Univ, Cleveland, OH 44106 USA
[2] Indian Inst Technol, Kharagpur 721302, W Bengal, India
来源
IEEE DESIGN & TEST OF COMPUTERS | 2012年 / 29卷 / 03期
关键词
Hardware IP Protection; Hardware Trojan; IP Evaluation; IP Piracy;
D O I
10.1109/MDT.2012.2205997
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
A low-cost solution for hardware IP protection during evaluation, by embedding a hardware Trojan inside an IP in the form of a finite state machine is proposed. The Trojan disrupts the normal functional behavior of the IP on occurrence of a sequence of rare events, thereby effectively putting an expiry date on the usage of the IP. The proposed technique is based on embedding a specially crafted finite state machine (FSM), which follows the structure of a sequential hardware Trojan (SHT) in the evaluation copy of a hardware IP. An illegal SoC containing a pirated evaluation copy of an IP would cease to follow the specified functionality after the evaluation period due to the presence of a sequential Trojan, which acts like a hardware time-bomb. To prevent potential reverse engineering of the modified IP aiming to isolate the Trojan, low-overhead design obfuscation techniques are implemented. It provides a designer adequate flexibility to evaluate it, while protecting the interest of the IP vendors.
引用
收藏
页码:70 / 79
页数:10
相关论文
共 50 条
  • [41] FPGA-Based Protection Scheme against Hardware Trojan Horse Insertion Using Dummy Logic
    Khaleghi, Behnam
    Ahari, Ali
    Asadi, Hossein
    Bayat-Sarmadi, Siavash
    IEEE EMBEDDED SYSTEMS LETTERS, 2015, 7 (02) : 46 - 50
  • [42] SC-COTD: Hardware Trojan Detection Based on Sequential/Combinational Testability Features using Ensemble Classifier
    Tebyanian, Mahshid
    Mokhtarpour, Azadeh
    Shafieinejad, Alireza
    JOURNAL OF ELECTRONIC TESTING-THEORY AND APPLICATIONS, 2021, 37 (04): : 473 - 487
  • [43] On automating delayered IC analysis for hardware IP protection
    Sarkar, Esha
    Maniatakos, Michail
    INTERNATIONAL CONFERENCE ON OMNI-LAYER INTELLIGENT SYSTEMS (COINS), 2019, : 205 - 210
  • [44] On automating delayered IC analysis for hardware IP protection
    Sarkar, Esha
    Maniatakos, Michail
    ACM International Conference Proceeding Series, 2019, Part F148162 : 205 - 210
  • [45] SC-COTD: Hardware Trojan Detection Based on Sequential/Combinational Testability Features using Ensemble Classifier
    Mahshid Tebyanian
    Azadeh Mokhtarpour
    Alireza Shafieinejad
    Journal of Electronic Testing, 2021, 37 : 473 - 487
  • [46] Hardware IP Assurance against Trojan Attacks with Machine Learning and Post-processing
    Gaikwad, Pravin
    Cruz, Jonathan
    Chakraborty, Prabuddha
    Bhunia, Swarup
    Hoque, Tamzidul
    ACM JOURNAL ON EMERGING TECHNOLOGIES IN COMPUTING SYSTEMS, 2023, 19 (03)
  • [47] Contrastive Graph Convolutional Networks for Hardware Trojan Detection in Third Party IP Cores
    Muralidhar, Nikhil
    Zuhair, Abdullah
    Weidler, Nathanael
    Gerdes, Ryan
    Ramakrishnan, Naren
    2021 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST), 2021, : 181 - 191
  • [48] Contrastive Graph Convolutional Networks for Hardware Trojan Detection in Third Party IP Cores
    Muralidhar, Nikhil
    Zubair, Abdullah
    Weidler, Nathanael
    Gerdes, Ryan
    Ramakrishnan, Naren
    Proceedings of the 2021 IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2021, 2021, : 181 - 191
  • [49] Combinational Hardware Trojan Detection Using Logic Implications
    Cornell, Noah
    Nepal, Kundan
    2017 IEEE 60TH INTERNATIONAL MIDWEST SYMPOSIUM ON CIRCUITS AND SYSTEMS (MWSCAS), 2017, : 571 - 574
  • [50] Hardware Trojan Detection Using Shapley Ensemble Boosting
    Pan, Zhixin
    Mishra, Prabhat
    Proceedings of the Asia and South Pacific Design Automation Conference, ASP-DAC, 2023, : 496 - 503