2015 IEEE International Symposium on Hardware Oriented Security and Trust (HOST) 2015
DOI: 10.1109/hst.2015.7140236
|View full text |Cite
|
Sign up to set email alerts
|

A security-aware design scheme for better hardware Trojan detection sensitivity

Abstract: Due to the trend of outsourcing designs to foundries overseas, there has been an increasing threat of malicious modifications to the original integrated circuits (ICs), also known as hardware Trojans. Numerous countermeasures have been proposed. However, very little effort has been made to design-time strategies that help to make test-time or run-time detection of Trojans easier. In this paper, we characterize each cell's sensitivity to malicious modifications and develop an algorithm to select a subset of sta… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(2 citation statements)
references
References 12 publications
0
2
0
Order By: Relevance
“…The most common ones attempt to either detect malicious circuitry, or prevent insertions. In particular, detection techniques aim to determine whether any HTs exist in a given circuit and feature a wide range of methods such as side-channel analysis [3,79,95,97], logic testing [26], and trust verification [8,68,90,102]. On the other hand, prevention techniques aim to either impede the introduction of HTs, or make HT easier to detect, such approaches are Split manufacturing [28,69,94] which tries to minimize the circuit/design exposure to the adversary, logic obfuscation [25] and runtime monitoring [47,88] Moreover, there is also a smaller body of work which attempts to tackle the even harder problem of inferring additional information about the HT such as its triggers, payload, and exact location [95,97].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The most common ones attempt to either detect malicious circuitry, or prevent insertions. In particular, detection techniques aim to determine whether any HTs exist in a given circuit and feature a wide range of methods such as side-channel analysis [3,79,95,97], logic testing [26], and trust verification [8,68,90,102]. On the other hand, prevention techniques aim to either impede the introduction of HTs, or make HT easier to detect, such approaches are Split manufacturing [28,69,94] which tries to minimize the circuit/design exposure to the adversary, logic obfuscation [25] and runtime monitoring [47,88] Moreover, there is also a smaller body of work which attempts to tackle the even harder problem of inferring additional information about the HT such as its triggers, payload, and exact location [95,97].…”
Section: Related Workmentioning
confidence: 99%
“…Understandably, design houses have much better control over the IC fabrication and the supply chain, and this allows them to take full advantage of our architecture. In particular, they can combine existing detection [8,26,68] and prevention techniques [25,28,69,94] with our proposed design, to reduce the likelihood of compromises for individual components. On the other hand, COTS vendors have less control as they have limited visibility in the fabrication process and the supply chain.…”
Section: Introductionmentioning
confidence: 99%