2014
DOI: 10.1145/2638555
|View full text |Cite
|
Sign up to set email alerts
|

Designing Trusted Embedded Systems from Finite State Machines

Abstract: Sequential components are crucial for a real-time embedded system as they control the system based on the system's current state and real life input. In this article, we explore the security and trust issues of sequential system design from the perspective of a finite state machine (FSM), which is the most popular model used to describe sequential systems. Specifically, we find that the traditional FSM synthesis procedure will introduce security risks and cannot guarantee trustworthiness in the implemented cir… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
15
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 44 publications
(15 citation statements)
references
References 18 publications
0
15
0
Order By: Relevance
“…CAD tools are essential to any design flow to bring up a design from a concept to silicon. Application of malicious logic synthesis tools to introduce Trojans have been reported in References [17,18,38]. All of these approaches consider a design whose Finite-State-Machine (FSM) is not completely specified.…”
Section: Refmentioning
confidence: 99%
See 3 more Smart Citations
“…CAD tools are essential to any design flow to bring up a design from a concept to silicon. Application of malicious logic synthesis tools to introduce Trojans have been reported in References [17,18,38]. All of these approaches consider a design whose Finite-State-Machine (FSM) is not completely specified.…”
Section: Refmentioning
confidence: 99%
“…Although these attacks can survive standalone, they will be easily detected in a complete tool flow during post-synthesis verification. A completely specified design approach to counter the malicious synthesis tools has been presented in Reference [39]; however, as indicated by Reference [38], complete specification of an FSM incurs a considerable area overhead. Application of CAD tools for hardware metering to prevent a malicious foundry from overproduction has been examined by Koushanfar et al [40].…”
Section: Refmentioning
confidence: 99%
See 2 more Smart Citations
“…Novel triggers using don'tcare states [53] or silicon wear-out mechanisms [54] have been developed which makes the Trojan get triggered in very rare conditions. Added circuitry due to new payloads may cause changes in the characteristics of the whole chip such as power signature and area consumed and may facilitate Trojan detection.…”
Section: Digital Hardware Trojansmentioning
confidence: 99%