首页> 外文会议>Design, Automation Test in Europe Conference Exhibition >An evolutionary approach to hardware encryption and Trojan-horse mitigation
【24h】

An evolutionary approach to hardware encryption and Trojan-horse mitigation

机译:硬件加密与木马缓解的进化方法

获取原文

摘要

New threats, grouped under the name of hardware attacks, became a serious concern in recent years. In a global market, untrusted parties in the supply chain may jeopardize the production of integrated circuits with intellectual-property piracy, illegal overproduction and hardware Trojan-horses (HT) injection. While one way to protect from overproduction is to encrypt the design by inserting logic gates that prevents the circuit from generating the correct outputs unless the right key is used, reducing the number of poorly-controllable signals is known to minimize the chances for an attacker to successfully hide the trigger for some malicious payload. Several approaches successfully tackled independently these two issues. This paper proposes a novel technique based on a multi-objective evolutionary algorithm able to increase hardware security by explicitly targeting both the minimization of rare signals and the maximization of the efficacy of logic encryption. Experimental results demonstrate the proposed method is effective in creating a secure encryption schema for all the circuits under test and in reducing the number rare signals on six circuits over nine, outperforming the current state of the art.
机译:在硬件攻击的名称下进行了新的威胁,近年来成为一个严重的问题。在全球市场中,供应链中不受信任的缔约方可能会危及具有知识产权盗版,非法生产力和五金特洛伊木马(HT)注射的集成电路的生产。虽然保护从过量生产的一种方法是通过插入防止电路不会产生正确的输出来加密设计,除非使用右键,尚可缩短可变的信号的数量,以最小化攻击者的机会成功隐藏一些恶意有效载荷的触发器。几种方法成功地解决了这两个问题。本文提出了一种基于多目标进化算法的新技术,其能够通过明确瞄准罕见信号的最小化和逻辑加密功效的最大化来提高硬件安全性。实验结果证明了所提出的方法有效地为正在测试的所有电路创建安全加密模式,并在九个电路上减少九个电路的数量罕见的信号,优于现有技术。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号