Detection of Hardware Trojans in Third-Party Intellectual Property Using Untrusted Modules.

IEEE Trans. on CAD of Integrated Circuits and Systems(2016)

引用 23|浏览52
暂无评分
摘要
During the design of an integrated circuit, there are several opportunities for adversaries to make malicious modifications or insertions to a design. These attacks, known as hardware Trojans, can have catastrophic effects on a circuit if left undetected. This paper describes a technique for identifying hardware Trojans with logic-based payloads that are hidden within third-party intellectual property. Through comparison of two similar but untrusted designs, functional differences can be identified for all possible input combinations within a window of time. This technique was tested on multiple Trojan benchmarks and was found to be very effective, both in detectability and in speed of testing. As this technique has very low costs to implement, it represents an easy way for designers to gain a level of trust in previously untrusted designs.
更多
查看译文
关键词
copy protection,industrial property,integrated circuit design,integrated circuit testing,integrated logic circuits,invasive software,logic design,hardware Trojans,integrated circuit,logic-based payloads,third-party intellectual property,untrusted designs,untrusted modules,Circuit Synthesis,design methodology,formal verification,security
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要