首页> 外文OA文献 >TPAD: Hardware Trojan Prevention and Detection for Trusted Integrated Circuits
【2h】

TPAD: Hardware Trojan Prevention and Detection for Trusted Integrated Circuits

机译:TpaD:可信集成的硬件木马预防和检测   电路

代理获取
本网站仅为用户提供外文OA文献查询和代理获取服务,本网站没有原文。下单后我们将采用程序或人工为您竭诚获取高质量的原文,但由于OA文献来源多样且变更频繁,仍可能出现获取不到、文献不完整或与标题不符等情况,如果获取不到我们将提供退款服务。请知悉。

摘要

There are increasing concerns about possible malicious modifications ofintegrated circuits (ICs) used in critical applications. Such attacks are oftenreferred to as hardware Trojans. While many techniques focus on hardware Trojandetection during IC testing, it is still possible for attacks to go undetected.Using a combination of new design techniques and new memory technologies, wepresent a new approach that detects a wide variety of hardware Trojans duringIC testing and also during system operation in the field. Our approach can alsoprevent a wide variety of attacks during synthesis, place-and-route, andfabrication of ICs. It can be applied to any digital system, and can be tunedfor both traditional and split-manufacturing methods. We demonstrate itsapplicability for both ASICs and FPGAs. Using fabricated test chips with Trojanemulation capabilities and also using simulations, we demonstrate: 1. The areaand power costs of our approach can range between 7.4-165% and 0.07-60%,respectively, depending on the design and the attacks targeted; 2. The speedimpact can be minimal (close to 0%); 3. Our approach can detect 99.998% ofTrojans (emulated using test chips) that do not require detailed knowledge ofthe design being attacked; 4. Our approach can prevent 99.98% of specificattacks (simulated) that utilize detailed knowledge of the design beingattacked (e.g., through reverse-engineering). 5. Our approach never producesany false positives, i.e., it does not report attacks when the IC operatescorrectly.
机译:人们越来越担心关键应用中使用的集成电路(IC)的恶意修改。这种攻击通常称为硬件木马。尽管许多技术专注于IC测试期间的硬件木马检测,但仍然有可能无法检测到攻击。结合新的设计技术和新的内存技术,我们提出了一种新方法,可在IC测试期间以及在检测过程中检测多种硬件木马现场系统操作。我们的方法还可以防止在集成电路的合成,布局布线和制造过程中发生多种攻击。它可以应用于任何数字系统,并且可以针对传统和拆分制造方法进行调整。我们展示了其对ASIC和FPGA的适用性。通过使用具有Trojanemulation功能的预制测试芯片并通过仿真,我们证明:1.我们的方法的面积和功耗成本分别在7.4-165%和0.07-60%之间,具体取决于设计和针对的攻击; 2.速度影响可以最小(接近0%); 3.我们的方法可以检测到99.998%的特洛伊木马(使用测试芯片进行仿真),这些特洛伊木马不需要详细了解被攻击的设计; 4.我们的方法可以防止99.98%的特定攻击(模拟)利用了要攻击的设计的详细知识(例如,通过逆向工程)。 5.我们的方法永远不会产生任何误报,即,当IC正确运行时,它不会报告攻击。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
代理获取

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号