首页> 外文期刊>Computer-Aided Design of Integrated Circuits and Systems, IEEE Transactions on >A Novel Built-In Self-Authentication Technique to Prevent Inserting Hardware Trojans
【24h】

A Novel Built-In Self-Authentication Technique to Prevent Inserting Hardware Trojans

机译:一种新颖的内置自身份验证技术,可防止插入硬件木马

获取原文
获取原文并翻译 | 示例

摘要

With the rapid globalization of the semiconductor industry, hardware Trojans have become a significant threat to government agencies and enterprises that require secure and reliable systems for their critical applications. Because of the diversity of hardware Trojans and the randomness associated with process variations, hardware Trojan detection is a challenging problem. In this paper, we propose a novel technique, called built-in self-authentication (BISA), which can be used to make hardware Trojan insertion by untrusted Graphic Data System (GDSII) developer and untrusted foundry considerably more difficult and easier to detect. The unused spaces in the circuit layout represent the best opportunity to insert Trojans by these entities. BISA works by eliminating this spare space and filling it with functional filler cells, instead of nonfunctional filler cells. A self-testing procedure generates a digital signature that will be different if any BISA cells are changed because of hardware Trojan insertion. We demonstrate that BISA can be applied to any flat or bottom-up hierarchical design with negligible overhead in terms of area, power, and timing.
机译:随着半导体行业的迅速全球化,硬件木马已成为对关键应用程序需要安全可靠的系统的政府机构和企业的重大威胁。由于硬件木马的多样性以及与流程变化相关的随机性,因此硬件木马检测是一个具有挑战性的问题。在本文中,我们提出了一种称为内置自身份验证(BISA)的新技术,该技术可以使不可信图形数据系统(GDSII)开发人员和不可信铸造厂进行硬件木马插入变得更加困难和容易检测。电路布局中未使用的空间代表这些实体插入特洛伊木马的最佳机会。 BISA的工作原理是消除了这个备用空间,并用功能性填充单元代替了非功能性填充单元来填充它。自检程序会生成数字签名,如果由于插入了硬件Trojan而更改了BISA单元,则数字签名会有所不同。我们证明了BISA可以应用于任何平面或自底向上的分层设计,而在面积,功率和时序方面的开销却可以忽略不计。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号