A CHIP ARCHITECTURE FOR COMPRESSIVE SENSING BASED DETECTION OF IC TROJANS

被引:3
作者
Tsai, Yi-Min [1 ]
Huang, Keng-Yen [1 ]
Kung, H. T. [2 ]
Vlah, Dario [2 ]
Gwon, Youngjune L. [2 ]
Chen, Liang-Gee [1 ]
机构
[1] Natl Taiwan Univ, Grad Inst Elect Engn, Taipei, Taiwan
[2] Harvard Univ, Sch Engn & Appl Sci, Cambridge, MA USA
来源
2012 IEEE WORKSHOP ON SIGNAL PROCESSING SYSTEMS (SIPS) | 2012年
关键词
Compressive sensing; IC Trojan; CS-JTAG; measurement generator; LEAKAGE POWER;
D O I
10.1109/SiPS.2012.33
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
We present a chip architecture for a compressive sensing based method that can be used in conjunction with the JTAG standard to detect IC Trojans. The proposed architecture compresses chip output resulting from a large number of test vectors applied to a circuit under test (CUT). We describe our designs in sensing leakage power, computing random linear combinations under compressive sensing, and piggybacking these new functionalities on JTAG. Our architecture achieves approximately a 10 x speedup and 1000 x reduction in output bandwidth while incurring a small area overhead.
引用
收藏
页码:61 / 66
页数:6
相关论文
共 19 条
[1]   Trojan detection using IC fingerprinting [J].
Agrawal, Dakshi ;
Baktir, Selcuk ;
Karakoyunlu, Deniz ;
Rohatgi, Pankaj ;
Sunar, Berk .
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, :296-+
[2]  
[Anonymous], LOW POW EL DES IEEE
[3]  
[Anonymous], CIRC SYST ISCAS P IE
[4]  
[Anonymous], COMP AID DES ICCAD I
[5]  
[Anonymous], USENIX WORKSH HOT TO
[6]  
[Anonymous], 2010, IEEE Std 1685-2009, pC1
[7]   A Novel Sustained Vector Technique for the Detection of Hardware Trojans [J].
Banga, Mainak ;
Hsiao, Michael S. .
22ND INTERNATIONAL CONFERENCE ON VLSI DESIGN HELD JOINTLY WITH 8TH INTERNATIONAL CONFERENCE ON EMBEDDED SYSTEMS, PROCEEDINGS, 2009, :327-332
[8]   IEEE-SPS and connexions - An open access education collaboration [J].
Baraniuk, Richard G. ;
Burrus, C. Sidney ;
Thierstein, E. Joel .
IEEE SIGNAL PROCESSING MAGAZINE, 2007, 24 (06) :6-+
[9]   Decoding by linear programming [J].
Candes, EJ ;
Tao, T .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2005, 51 (12) :4203-4215
[10]   Hardware Trojan: Threats and Emerging Solutions [J].
Chakraborty, Rajat Subhra ;
Narasimhan, Seetharam ;
Bhunia, Swarup .
2009 IEEE INTERNATIONAL HIGH LEVEL DESIGN VALIDATION AND TEST WORKSHOP, 2009, :166-171