A Region Based Fingerprinting for Hardware Trojan Detection and Diagnosis

被引:0
作者
Saran, T. [1 ,2 ]
Ranjani, R. [1 ,2 ]
Devi, Nirmala M. [1 ,2 ]
机构
[1] Amrita Sch Engn, Dept Elect & Commun Engn, Coimbatore, Tamil Nadu, India
[2] Amrita Univ, Amrita Vishwa Vidyapeetham, Coimbatore, Tamil Nadu, India
来源
2017 4TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND INTEGRATED NETWORKS (SPIN) | 2017年
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In today's scenario, any design is vulnerable to third party attackers like Hardware Trojan depends on their accessibility to the design. Hardware Trojans are the pernicious circuitry which are added to an original design by an attacker. These Trojans may lead to erroneous output of a system or even can incapacitate the design. Hence there is a demand for detecting the Trojans. The proposed method segments the whole design into small regions and generates fingerprint out of those. The number of fingerprints again reduced by selection of only regions containing low activity nodes in the first iteration due to the probability of inserting a Trojan in the low activity node is more. Segmentation helps to improve to locate where exactly the Trojan is inserted. This proposed method is suitable to detect Trojans which gets activated by aging or Trojan that gets activated after a specific time period. Hamming distance Pattern optimization technique improves the toggling inside the regions which makes the Trojan effect more observable. Proposed algorithm is implemented and validated using ISCAS'85 benchmark circuits.
引用
收藏
页码:166 / 172
页数:7
相关论文
共 10 条
  • [1] Agrawal D., 2007, IEEE S SEC PRIV SP07
  • [2] [Anonymous], 7 IEEE INT WORKSH RE
  • [3] Balasch J., 2015, IEEE INT S EL COMP E
  • [4] Banga M., 2008, HARDWARE ORIENTED SE, P4047
  • [5] A Novel Sustained Vector Technique for the Detection of Hardware Trojans
    Banga, Mainak
    Hsiao, Michael S.
    [J]. 22ND INTERNATIONAL CONFERENCE ON VLSI DESIGN HELD JOINTLY WITH 8TH INTERNATIONAL CONFERENCE ON EMBEDDED SYSTEMS, PROCEEDINGS, 2009, : 327 - 332
  • [6] Jin Y., 2008, HARDWARE ORIENTED SE, P5157
  • [7] Karunakaran D. K., 2014, COMPUTING COMMUNICAT, P17
  • [8] Liu B., 2015, IEEE T RELIAB, V64
  • [9] Liu Y., 2014, 51 ANN DES AUT C ACM, P16
  • [10] Maneesh P. K., 2015, INDIAN J SCI TECHNOL, V8, P1