Title :
FPGA-Based Protection Scheme against Hardware Trojan Horse Insertion Using Dummy Logic
Author :
Khaleghi, Behnam ; Ahari, Ali ; Asadi, Hossein ; Bayat-Sarmadi, Siavash
Author_Institution :
Dept. of Comput. Eng., Sharif Univ. of Technol., Tehran, Iran
Abstract :
Hardware trojan horses (HTH) have recently emerged as a major security threat for field-programmable gate arrays (FPGAs). Previous studies to protect FPGAs against HTHs may still leave a considerable amount of logic resources to be misused by malicious attacks. This letter presents a low-level HTH protection scheme for FPGAs by filling the unused resources with the proposed dummy logic. In the proposed scheme, we identify the unused resources at the device layout-level and offer dummy logic cells for different resources. The proposed HTH protection scheme has been applied on Xilinx Virtex devices implementing a set of IWLS benchmarks. The results show that by employing the proposed HTH protection scheme, the chance of logic abuse can be significantly reduced. Experimental results also show that as compared to nonprotected designs, the proposed HTH scheme imposes no performance and power penalties.
Keywords :
field programmable gate arrays; invasive software; logic circuits; FPGA-based protection scheme; HTH; dummy logic; hardware Trojan horse insertion; logic resources; malicious attacks; security threat; Field programmable gate arrays; Hardware; Resource management; Routing; Table lookup; Trojan horses; Wires; Design for hardware trust; field-programmable gate arrays (FPGAs); hardware trojan horse;
Journal_Title :
Embedded Systems Letters, IEEE
DOI :
10.1109/LES.2015.2406791