DocumentCode :
500849
Title :
Hardware Trojan horse detection using gate-level characterization
Author :
Potkonjak, Miodrag ; Nahapetian, Ani ; Nelson, Michael ; Massey, Tammara
Author_Institution :
Comput. Sci. Dept., Univ. of California, Los Angeles (UCLA), Los Angeles, CA, USA
fYear :
2009
fDate :
26-31 July 2009
Firstpage :
688
Lastpage :
693
Abstract :
Hardware Trojan horses (HTHs) are the malicious altering of hardware specification or implementation in such a way that its functionality is altered under a set of conditions defined by the attacker. There are numerous HTHs sources including untrusted foundries, synthesis tools and libraries, testing and verification tools, and configuration scripts. HTH attacks can greatly comprise security and privacy of hardware users either directly or through interaction with pertinent systems and application software or with data. However, while there has been a huge research and development effort for detecting software Trojan horses, surprisingly, HTHs are rarely addressed. HTH detection is a particularly difficult task in modern and pending deep submicron technologies due to intrinsic manufacturing variability. Our goal is to provide an impetus for HTH research by creating a generic and easily applicable set of techniques and tools for HTH detection. We start by introducing a technique for recovery of characteristics of gates in terms of leakage current, switching power, and delay, which utilizes linear programming to solve a system of equations created using nondestructive measurements of power or delays. This technique is combined with constraint manipulation techniques to detect embedded HTHs. The effectiveness of the approach is demonstrated on a number of standard benchmarks.
Keywords :
integrated circuits; invasive software; linear programming; logic gates; power aware computing; gate level characterization; hardware Trojan horse detection; hardware specification; linear programming; nondestructive power measurements; Application software; Data privacy; Data security; Foundries; Hardware; Invasive software; Manufacturing; Research and development; Software libraries; Testing; Hardware Trojan horses; gate-level characterization; linear programming; manufacturing variability;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Design Automation Conference, 2009. DAC '09. 46th ACM/IEEE
Conference_Location :
San Francisco, CA
ISSN :
0738-100X
Print_ISBN :
978-1-6055-8497-3
Type :
conf
Filename :
5227106
Link To Document :
بازگشت