首页> 外文会议>IEEE International Symposium on Hardware-Oriented Security and Trust >A security-aware design scheme for better hardware Trojan detection sensitivity
【24h】

A security-aware design scheme for better hardware Trojan detection sensitivity

机译:一种安全意识的设计方案,可提高硬件木马检测的敏感性

获取原文

摘要

Due to the trend of outsourcing designs to foundries overseas, there has been an increasing threat of malicious modifications to the original integrated circuits (ICs), also known as hardware Trojans. Numerous countermeasures have been proposed. However, very little effort has been made to design-time strategies that help to make test-time or run-time detection of Trojans easier. In this paper, we characterize each cell's sensitivity to malicious modifications and develop an algorithm to select a subset of standard cells for a given circuit such that Trojans are easily detected using [1] when the circuit is synthesized on it. Experiments on 8 publicly available benchmarks show that using our method, we could detect on average 16.87% more Trojans with very small power/area overhead and no timing violations.
机译:由于将设计外包给海外代工厂的趋势,对恶意修改原始集成电路(IC)(也称为硬件木马)的威胁越来越大。已经提出了许多对策。但是,在设计时策略方面所做的工作很少,这有助于使木马的测试时或运行时检测更加容易。在本文中,我们描述了每个单元对恶意修改的敏感性,并开发了一种算法,用于为给定电路选择标准单元的子集,以便在电路上进行合成时可以轻松地使用[1]来检测特洛伊木马。在8个公开基准测试中进行的实验表明,使用我们的方法,在功率/区域开销很小且没有时序违规的情况下,我们平均可以检测出多出16.87%的木马。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号