首页> 外文会议>Design, Automation Test in Europe Conference Exhibition >An evolutionary approach to hardware encryption and Trojan-horse mitigation
【24h】

An evolutionary approach to hardware encryption and Trojan-horse mitigation

机译:硬件加密和特洛伊木马缓解的演进方法

获取原文

摘要

New threats, grouped under the name of hardware attacks, became a serious concern in recent years. In a global market, untrusted parties in the supply chain may jeopardize the production of integrated circuits with intellectual-property piracy, illegal overproduction and hardware Trojan-horses (HT) injection. While one way to protect from overproduction is to encrypt the design by inserting logic gates that prevents the circuit from generating the correct outputs unless the right key is used, reducing the number of poorly-controllable signals is known to minimize the chances for an attacker to successfully hide the trigger for some malicious payload. Several approaches successfully tackled independently these two issues. This paper proposes a novel technique based on a multi-objective evolutionary algorithm able to increase hardware security by explicitly targeting both the minimization of rare signals and the maximization of the efficacy of logic encryption. Experimental results demonstrate the proposed method is effective in creating a secure encryption schema for all the circuits under test and in reducing the number rare signals on six circuits over nine, outperforming the current state of the art.
机译:近年来,以硬件攻击的名义归为一类的新威胁已成为一个严重的问题。在全球市场中,供应链中不受信任的各方可能会危害具有知识产权盗版,非法超额生产和特洛伊木马(HT)注入的集成电路的生产。防止过度生产的一种方法是通过插入逻辑门来加密设计,以防止电路生成正确的输出(除非使用了正确的密钥,除非使用了正确的密钥),但减少可控信号的数量已知可以最大程度地减少攻击者攻击的可能性。成功隐藏某些恶意有效负载的触发器。几种方法成功地独立解决了这两个问题。本文提出了一种基于多目标进化算法的新颖技术,该技术可以通过明确地针对稀有信号的最小化和逻辑加密的有效性的最大化来提高硬件安全性。实验结果表明,所提出的方法可有效地为所有被测电路创建安全的加密方案,并能在六个以上的六个电路上减少稀有信号的数量,其性能优于现有技术。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号