TPAD: Hardware Trojan Prevention and Detection for Trusted Integrated Circuits

被引:66
作者
Wu, Tony F. [1 ]
Ganesan, Karthik [1 ]
Hu, Yunqing Alexander [1 ]
Wong, H. -S. Philip [1 ]
Wong, Simon [1 ]
Mitra, Subhasish [1 ,2 ]
机构
[1] Stanford Univ, Dept Elect Engn, Stanford, CA 94305 USA
[2] Stanford Univ, Dept Comp Sci, Stanford, CA 94305 USA
关键词
3-D integration; concurrent error detection; hardware security; hardware Trojan; randomized codes; reliable computing; resistive RAM (RRAM); split manufacturing; DESIGN; ERROR; ALGORITHM; ATTACKS; PIRACY;
D O I
10.1109/TCAD.2015.2474373
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
There are increasing concerns about possible malicious modifications of integrated circuits (ICs) used in critical applications. Such attacks are often referred to as hardware Trojans. While many techniques focus on hardware Trojan detection during IC testing, it is still possible for attacks to go undetected. Using a combination of new design techniques and new memory technologies, we present a new approach that detects a wide variety of hardware Trojans during IC testing and also during system operation in the field. Our approach can also prevent a wide variety of attacks during synthesis, place-and-route, and fabrication of ICs. It can be applied to any digital system, and can be tuned for both traditional and split-manufacturing methods. We demonstrate its applicability for both application-specified integrated circuits and field-programmable gate arrays. Using fabricated test chips with Trojan emulation capabilities and also using simulations, we demonstrate: 1) the area and power costs of our approach can range between 7.4%-165% and 7%-60%, respectively, depending on the design and the attacks targeted; 2) the speed impact can be minimal (close to 0%); 3) our approach can detect 99.998% of Trojans (emulated using test chips) that do not require detailed knowledge of the design being attacked; 4) our approach can prevent 99.98% of specific attacks (simulated) that utilize detailed knowledge of the design being attacked (e.g., through reverse engineering); and 5) our approach never produces any false positives, i.e., it does not report attacks when the IC operates correctly.
引用
收藏
页码:521 / 534
页数:14
相关论文
共 88 条
  • [1] Examining the Link Between Issue Attitudes and News Source: The Case of Latinos and Immigration Reform
    Abrajano, Marisa
    Singh, Simran
    [J]. POLITICAL BEHAVIOR, 2009, 31 (01) : 1 - 30
  • [2] Altera, 2014, IND 1 FLOAT POINT FP
  • [3] [Anonymous], TIC PROGR
  • [4] [Anonymous], 4297 TDA PROGR JET P
  • [5] [Anonymous], 2014, 2014 51 ACM EDAC IEE
  • [6] [Anonymous], 2011, NANG 45NM OP CELL LI
  • [7] [Anonymous], 2013, 22 USENIX SEC S USEN
  • [8] [Anonymous], TPAD HARDWARE TROJAN
  • [9] [Anonymous], OR 1200 OPENRISC PRO
  • [10] [Anonymous], 2004, Error Control Coding