DocumentCode
614335
Title
Defeating hardware spyware in third party IPs
Author
Al-Anwar, Amr ; Alkabani, Yousra ; El-Kharashi, M. Watheq ; Bedour, Hassan
Author_Institution
Comput. & Syst. Eng. Dept., Ain Shams Univ., Cairo, Egypt
fYear
2013
fDate
27-30 April 2013
Firstpage
1
Lastpage
5
Abstract
Hardware spyware detection is a very critical topic, especially as untrusted third parties contribute in designing and/or manufacturing. Comparing a suspected design with a golden one is the most common way to detect hardware Trojans. But, this methodology cannot be used with third party IPs, as we have no golden IP to compare with. In this work, we present a novel technique for system protection that alleviates the need for a golden chip. We aim to decrease the ability of leaking sensitive information by infected IPs. We use IPs output multiplexing and cyclic redundancy check to achieve negligible probability of losing sensitive information and to detect IP Spyware. We show the practicality of the introduced schemes by implementing the provided methodologies on a FPGA. Experimental results illustrate a negligible delay overhead while the area and power overheads can be tolerated for critical systems information security.
Keywords
field programmable gate arrays; invasive software; FPGA; IP spyware detection; area overhead; cyclic redundancy check; delay overhead; hardware Trojans detection; hardware spyware detection; output multiplexing; power overhead; suspected design; system information security; system protection; third party IP; Delays; Hardware; IP networks; Multiplexing; Spyware; Table lookup; Trojan horses; Hardware attack; hardware trojan; spywares; third-party IP;
fLanguage
English
Publisher
ieee
Conference_Titel
Electronics, Communications and Photonics Conference (SIECPC), 2013 Saudi International
Conference_Location
Fira
Print_ISBN
978-1-4673-6196-5
Electronic_ISBN
978-1-4673-6194-1
Type
conf
DOI
10.1109/SIECPC.2013.6550785
Filename
6550785
Link To Document