首页> 外文会议>International On-Line Testing Symposium >A post-deployment IC trust evaluation architecture
【24h】

A post-deployment IC trust evaluation architecture

机译:部署后IC信任评估架构

获取原文

摘要

The use of side-channel parametric measurements along with statistical analysis methods for detecting hardware Trojans in fabricated integrated circuits has been studied extensively in recent years, initially for digital designs but recently also for their analog/RF counterparts. Such post-fabrication trust evaluation methods, however, are unable to detect dormant hardware Trojans which are activated after a circuit is deployed in its field of operation. For the latter, an on-chip trust evaluation method is required. To this end, we present a general architecture for post-deployment trust evaluation based on on-chip classifiers. Specifically, we discuss the design of an on-chip analog neural network which can be trained to distinguish trusted from untrusted circuit functionality based on simple measurements obtained via on-chip measurement acquisition sensors. The proposed method is demonstrated using a Trojan-free and two Trojan-infested variants of a wireless cryptographic IC design, as well as a fabricated programmable neural network experimentation chip. As corroborated by the obtained experimental results, two current measurements suffice for the on-chip classifier to effectively assess trustworthiness and, thereby, detect hardware Trojans that are activated after chip deployment.
机译:近年来,已经广泛研究了使用旁通道参数测量以及统计分析方法来检测人造集成电路中的硬件特洛伊木马,最初是针对数字设计,而最近还针对其模拟/ RF对应物。但是,这种制造后信任评估方法无法检测到休眠硬件特洛伊木马程序,这些休眠特洛伊木马程序是在电路部署于其工作领域后激活的。对于后者,需要一种片上信任评估方法。为此,我们提出了一种基于片上分类器的部署后信任评估的通用体系结构。具体来说,我们讨论了片上模拟神经网络的设计,该神经网络可以进行训练,以基于通过片上测量采集传感器获得的简单测量值,将可信电路功能与不可信电路功能区分开。使用无线密码IC设计的无Trojan和Trojan感染的两个变体以及预制的可编程神经网络实验芯片,演示了所提出的方法。正如所获得的实验结果所证实的那样,两次电流测量足以使片上分类器有效评估可信度,从而检测出在芯片部署后激活的硬件特洛伊木马。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号