DocumentCode :
3480943
Title :
Hardware Trojan Protection for Third Party IPs
Author :
Al-Anwar, Amr ; Alkabani, Yousra ; El-Kharashi, M. Watheq ; Bedour, Hassan
Author_Institution :
Comput. & Syst. Eng. Dept., Ain Shams Univ., Cairo, Egypt
fYear :
2013
fDate :
4-6 Sept. 2013
Firstpage :
662
Lastpage :
665
Abstract :
Hardware Trojan detection is a very important topic especially as parts of critical systems which are designed and/or manufactured by untrusted third parties. Most of the current research concentrates on detecting Trojans at the testing phase by comparing the suspected circuit to a golden (trusted) one. However, these attempts do not work in the case of third party IPs, which are black boxes with no golden IPs to trust. In this work, we present novel methods for system protection that alleviate the need for a golden chip. Protection against injected Trojan is done using simple blockage method. We show the practicality of the introduced schemes by providing a proof of concept implementation of the proposed methodology on FPGA. We showed that the overhead is low enough in the simple blockage method. The delay overhead is negligible while the power overhead does not exceed 2%.
Keywords :
field programmable gate arrays; logic design; trusted computing; FPGA; black boxes; critical systems; golden chip; hardware trojan protection; simple blockage method; system protection; third party IP; Benchmark testing; Cryptography; Delays; Hardware; IP networks; Standards; Trojan horses; backdoors; hardware; hardware attack; hardware trojan; security; third-party IP;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Digital System Design (DSD), 2013 Euromicro Conference on
Conference_Location :
Los Alamitos, CA
Type :
conf
DOI :
10.1109/DSD.2013.133
Filename :
6628342
Link To Document :
بازگشت