Detection of Hardware Trojans in Third-Party Intellectual Property Using Untrusted Modules
Autor: | Trey Reece, William H. Robinson |
---|---|
Rok vydání: | 2016 |
Předmět: |
021110 strategic
defence & security studies Engineering Third party business.industry 0211 other engineering and technologies Window (computing) 02 engineering and technology Integrated circuit Intellectual property computer.software_genre Computer Graphics and Computer-Aided Design 020202 computer hardware & architecture law.invention law Trojan Embedded system 0202 electrical engineering electronic engineering information engineering Operating system Electrical and Electronic Engineering business computer Software Computer hardware |
Zdroj: | IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems. 35:357-366 |
ISSN: | 1937-4151 0278-0070 |
DOI: | 10.1109/tcad.2015.2459038 |
Popis: | During the design of an integrated circuit, there are several opportunities for adversaries to make malicious modifications or insertions to a design. These attacks, known as hardware Trojans, can have catastrophic effects on a circuit if left undetected. This paper describes a technique for identifying hardware Trojans with logic-based payloads that are hidden within third-party intellectual property. Through comparison of two similar but untrusted designs, functional differences can be identified for all possible input combinations within a window of time. This technique was tested on multiple Trojan benchmarks and was found to be very effective, both in detectability and in speed of testing. As this technique has very low costs to implement, it represents an easy way for designers to gain a level of trust in previously untrusted designs. |
Databáze: | OpenAIRE |
Externí odkaz: |