首页 | 本学科首页   官方微博 | 高级检索  
     


Effective usage of redundancy to aid neutralization of hardware Trojans in Integrated Circuits
Affiliation:1. Instituto Nacional de Astrofísica Óptica y Electrónica, Puebla, Mexico;2. Instituto Tecnológico de Puebla, Puebla, Mexico;3. New Mexico State University, Las Cruces, NM, USA;4. Spycotec, Fracc. Paseos del Angel Puebla, Puebla. +52-2228870916, Mexico;5. Benemérita Universidad Autónoma de Puebla, Puebla, Mexico;6. Instituto Tecnológico de Cd. Guzmán, Av. Tecnológico #100, Cd. Guzmán, Jal., Mexico;1. Department of Micro-Nano Electronics, Shanghai Jiao Tong University, Shanghai, China;2. Department of Electrical Engineering, Tongji University, Shanghai, China;1. School of Software and TNLIST, Tsinghua University, Beijing, China;2. Department of Computer Science and Technology and TNLIST, Tsinghua University, Beijing, China
Abstract:Hardware Trojans are malicious alterations in Integrated Circuits (ICs) that leak confidential information or disable the entire IC. The detection of these Trojans is performed through logic or side channel based testing. Under sub-nm technologies the detection of Hardware Trojans will face more problems due to process variations. Hence, there is a need to devise countermeasures which do not depend completely on detection. In order to achieve such a countermeasure, we propose to neutralize the effect of Hardware Trojans through redundancy. In this work, we present a Triple Modular Redundancy (TMR) based methodology to neutralize Hardware Trojans. In order to address the inevitable overhead on area, TMR will be implemented only on select paths of the circuit. Using a probabilistic model of a given digital circuit, we have measured the effect of Trojan on different paths of the circuit and found that equally probable output paths are vulnerable to Trojan placement. Therefore for security we propose that TMR should be implemented on the paths that lead to equally probable primary outputs. We have also shown that the detection of Trojans placed on predictable paths can be achieved through logic based testing methods. In order for the adversary to beat the proposed redundancy model, the size of the Trojan has to be larger. We have shown that such implementation can be detected using side channel based testing.
Keywords:Hardware Trojans  Neutralization  TMR
本文献已被 ScienceDirect 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号