首页> 外文会议>ACM/EDAC/IEEE Design Automation Conference >High-Level Synthesis for Run-Time Hardware Trojan Detection and Recovery
【24h】

High-Level Synthesis for Run-Time Hardware Trojan Detection and Recovery

机译:运行时硬件特洛伊木马检测和恢复的高级合成

获取原文

摘要

Current Integrated Circuit (IC) development process raises security concerns about hardware Trojan which are maliciously inserted to alter functional behavior or leak sensitive information. Most of the hardware Trojan detection techniques rely on a golden (trusted) IC against which to compare a suspected one. Hence they cannot be applied to designs using third party Intellectual Property (IP) cores where golden IP is unavailable. Moreover, due to the stealthy nature of hardware Trojan, there is no technique that can guarantee Trojan-free after manufacturing test. As a result, Trojan detection and recovery at run time acting as the last line of defense is necessary especially for mission-critical applications. In this paper, we propose design rules to assist run-time Trojan detection and fast recovery by exploring diversity of untrusted third party IP cores. With these design rules, we show the optimization approach to minimize the cost of implementation in terms of the number of different IP cores used by the implementation.
机译:目前的集成电路(IC)开发过程提高了关于硬件特洛伊木马的安全问题,这是恶意插入的,以改变功能行为或泄漏敏感信息。大多数硬件特洛伊木马检测技术依赖于金色(可信的)IC,以比较怀疑的IC。因此,他们不能应用于使用第三方知识产权(IP)核心的设计,其中Golden IP不可用。此外,由于硬件木马的隐身性质,没有技术可以保证制造测试后无特洛伊木马。因此,在运行时的特洛伊木马检测和恢复作为最后的防御行为,特别是对于关键任务应用程序是必要的。在本文中,我们提出了设计规则,通过探索不受信任的第三方IP核心的多样性来协助运行时间的特洛伊木马检测和快速恢复。通过这些设计规则,我们展示了优化方法,以最大限度地减少实现的不同IP核心数量的实现成本。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号