首页> 外文会议>IEEE International Symposium on Hardware-Oriented Security and Trust >A security-aware design scheme for better hardware Trojan detection sensitivity
【24h】

A security-aware design scheme for better hardware Trojan detection sensitivity

机译:一种用于更好的硬件特洛伊木马检测灵敏度的安全感知设计方案

获取原文

摘要

Due to the trend of outsourcing designs to foundries overseas, there has been an increasing threat of malicious modifications to the original integrated circuits (ICs), also known as hardware Trojans. Numerous countermeasures have been proposed. However, very little effort has been made to design-time strategies that help to make test-time or run-time detection of Trojans easier. In this paper, we characterize each cell's sensitivity to malicious modifications and develop an algorithm to select a subset of standard cells for a given circuit such that Trojans are easily detected using [1] when the circuit is synthesized on it. Experiments on 8 publicly available benchmarks show that using our method, we could detect on average 16.87% more Trojans with very small power/area overhead and no timing violations.
机译:由于向海外铸造的外包设计的趋势,对原始集成电路(ICS)的恶意修改造成了越来越大的威胁,也称为硬件特洛伊木马。已经提出了许多对策。然而,已经对设计时策略进行了很少的努力,有助于使特洛伊木马的测试时间或运行时间检测更容易。在本文中,我们将每个小区对恶意修改的敏感性表征,并开发一种算法来选择给定电路的标准单元的子集,使得当电路在其上合成电路时容易检测到特洛伊木马。 8个公开的基准测试显示,使用我们的方法,我们可以平均检测16.87%的特洛伊木马,具有非常小的功率/区域开销,没有时间违规。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号