Sequential hardware Trojan: Side-channel aware design and placement

Computer Design(2011)

引用 67|浏览0
暂无评分
摘要
Various design-for-security (DFS) approaches have been proposed earlier for detection of hardware Trojans, which are malicious insertions in Integrated Circuits (ICs). In this paper, we highlight our major findings in terms of innovative Trojan design that can easily evade existing Trojan detection approaches based on functional testing or side-channel analysis. In particular, we illustrate design and placement of sequential hardware Trojans, which are rarely activated/observed and incur ultralow delay/power overhead. We provide models, examples, theoretical analysis of effectiveness, and simulation as well as measurement results of impact of these Trojans in a hardened design. It is shown that efficient design and placement of sequential Trojan would incur extremely low side-channel (power, delay) signature and hence, can easily evade both post-silicon validation and DFS (e.g. ring oscillator based) approaches.
更多
查看译文
关键词
post-silicon validation,efficient design,side-channel signature,side-channel analysis,side-channel aware placement,side-channel aware design,power overhead,trojan detection,security,integrated circuits,sequential hardware trojan,functional testing,dfs,hardware trojan,sequential trojan,hardened design,hardware trojan detection,design-for-security approach,innovative trojan design,low side-channel,ultralow-delay-power overhead,integrated circuit design,hardware trojan attacks,ic,dfs approach,radiation detectors,logic gates,field programmable gate arrays,hardware,payloads
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要