New Design Strategy for Improving Hardware Trojan Detection and Reducing Trojan Activation Time

被引:74
作者
Salmani, Hassan [1 ]
Tehranipoor, Mohammad [1 ]
Plusquellic, Jim [2 ]
机构
[1] Univ Connecticut, ECE Dept, Storrs, CT 06269 USA
[2] Univ New Mexico, ECE Dept, Albuquerque, NM USA
来源
2009 IEEE INTERNATIONAL WORKSHOP ON HARDWARE-ORIENTED SECURITY AND TRUST | 2009年
基金
美国国家科学基金会;
关键词
D O I
10.1109/HST.2009.5224968
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Hardware Trojans in integrated circuits and systems have become serious concern to fabless semiconductor industry and government agencies in recent years. Most of the previously proposed Trojan detection methods rely on Trojan activation to either observe a faulty output or measure side-channel signals such as transient current or charge. From the authentication stand point, time to trigger a. hardware Trojan circuit is a a major concern. This paper analyzes time to (i) generate a. transition in functional Trojans and (ii) fully activate them. An efficient dummy flip-flop insertion procedure is proposed to increase Trojan activity. Depending on authentication time and circuit topology, a transition probability threshold is selected so that inserted dummy flip-flops would moderately impact area overhead. The simulation results on s38417 benchmark circuit demonstrate that, with a negligible area overhead, our proposed method can significantly increase Trojan activity and reduce Trojan activation time.
引用
收藏
页码:66 / +
页数:2
相关论文
共 14 条
[1]  
ADEE S., The hunt for the kill switch
[2]   Trojan detection using IC fingerprinting [J].
Agrawal, Dakshi ;
Baktir, Selcuk ;
Karakoyunlu, Deniz ;
Rohatgi, Pankaj ;
Sunar, Berk .
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, :296-+
[3]  
[Anonymous], 2008, MATH STAT APPL
[4]  
[Anonymous], P IEEE ACM INT C COM
[5]  
[Anonymous], DEF SCI BOARD TASK F
[6]  
[Anonymous], P IEEE INT WORKSH HA
[7]   A Novel Sustained Vector Technique for the Detection of Hardware Trojans [J].
Banga, Mainak ;
Hsiao, Michael S. .
22ND INTERNATIONAL CONFERENCE ON VLSI DESIGN HELD JOINTLY WITH 8TH INTERNATIONAL CONFERENCE ON EMBEDDED SYSTEMS, PROCEEDINGS, 2009, :327-332
[8]  
Bushnell M., 2000, ESSENTIALS ELECT TES
[9]   Randomization Based Probabilistic Approach to Detect Trojan Circuits [J].
Jha, Susmit ;
Jha, Sumit Kumar .
11TH IEEE HIGH ASSURANCE SYSTEMS ENGINEERING SYMPOSIUM, PROCEEDINGS, 2008, :117-+
[10]  
Li J, 2008, 2008 IEEE INTERNATIONAL WORKSHOP ON HARDWARE-ORIENTED SECURITY AND TRUST, P8, DOI 10.1109/HST.2008.4559038