A Resizing Method to Minimize Effects of Hardware Trojans

被引:10
作者
Cha, Byeongju [1 ]
Gupta, Sandeep K. [1 ]
机构
[1] Univ Southern Calif, Ming Hsieh Dept Elect Engn, Los Angeles, CA 90089 USA
来源
2014 IEEE 23RD ASIAN TEST SYMPOSIUM (ATS) | 2014年
关键词
hardware Trojan; parametric test; gate resizing; delay measurement; VARIABILITY;
D O I
10.1109/ATS.2014.44
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Due to emerging threats of hardware Trojan insertion, many techniques to detect Trojans and protect the original design have been developed. However, an intelligent adversary is expected to be aware of every state-of-the-art detection technique and develop new countermeasures to make a majority of these obsolete. In this paper, we propose and analyze a new attack scenario that targets every known non-destructive detection method and imposes negligible impact on every measurable circuit parameter. We start by introducing our key ideas for hiding the delay impact of the Trojan via gate resizing. The gate resizing problem is then formulated and implemented. Our method redesigns the circuit at minimal cost without affecting the functionality of the circuit, can be applied in conjunction with any other attack scenario, and maintains its benefit independent of the type and functionality of Trojan circuitry. Finally, via extensive experiments on benchmarks we demonstrate that our method greatly increases the difficulty of detecting Trojans via any combination of delay, current, and power measurements and has very small area overhead.
引用
收藏
页码:192 / 199
页数:8
相关论文
共 34 条
[1]   A Statistical Design-Oriented Delay Variation Model Accounting for Within-Die Variations [J].
Abu-Rahma, Mohamed H. ;
Anis, Mohab .
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2008, 27 (11) :1983-1995
[2]  
[Anonymous], DEF SCI BOARD TASK F
[3]  
[Anonymous], 2009, IEEE T VERY LARGE SC
[4]  
[Anonymous], DATE
[5]   A region based approach for the identification of hardware Trojans [J].
Banga, Mainak ;
Hsiao, Michael S. .
2008 IEEE INTERNATIONAL WORKSHOP ON HARDWARE-ORIENTED SECURITY AND TRUST, 2008, :40-47
[6]  
Becker GT, 2013, LECT NOTES COMPUT SC, V8086, P197, DOI 10.1007/978-3-642-40349-1_12
[7]   High-performance CMOS variability in the 65-nm regime and beyond [J].
Bernstein, K. ;
Frank, D. J. ;
Gattiker, A. E. ;
Haensch, W. ;
Ji, B. L. ;
Nassif, S. R. ;
Nowak, E. J. ;
Pearson, D. J. ;
Rohrer, N. J. .
IBM JOURNAL OF RESEARCH AND DEVELOPMENT, 2006, 50 (4-5) :433-449
[8]  
Byeongju Cha, 2012, 2012 21st Asian Test Symposium (ATS 2012). Proceedings, P355, DOI 10.1109/ATS.2012.64
[9]   Design sensitivities to variability: Extrapolations and assessments in nanometer VLSI [J].
Cao, Y ;
Gupta, P ;
Kahng, AB ;
Sylvester, D ;
Yang, J .
15TH ANNUAL IEEE INTERNATIONAL ASIC/SOC CONFERENCE, PROCEEDINGS, 2002, :411-415
[10]  
Cha B, 2013, DES AUT TEST EUROPE, P1265