• DocumentCode
    78161
  • Title

    FPGA-Based Protection Scheme against Hardware Trojan Horse Insertion Using Dummy Logic

  • Author

    Khaleghi, Behnam ; Ahari, Ali ; Asadi, Hossein ; Bayat-Sarmadi, Siavash

  • Author_Institution
    Dept. of Comput. Eng., Sharif Univ. of Technol., Tehran, Iran
  • Volume
    7
  • Issue
    2
  • fYear
    2015
  • fDate
    Jun-15
  • Firstpage
    46
  • Lastpage
    50
  • Abstract
    Hardware trojan horses (HTH) have recently emerged as a major security threat for field-programmable gate arrays (FPGAs). Previous studies to protect FPGAs against HTHs may still leave a considerable amount of logic resources to be misused by malicious attacks. This letter presents a low-level HTH protection scheme for FPGAs by filling the unused resources with the proposed dummy logic. In the proposed scheme, we identify the unused resources at the device layout-level and offer dummy logic cells for different resources. The proposed HTH protection scheme has been applied on Xilinx Virtex devices implementing a set of IWLS benchmarks. The results show that by employing the proposed HTH protection scheme, the chance of logic abuse can be significantly reduced. Experimental results also show that as compared to nonprotected designs, the proposed HTH scheme imposes no performance and power penalties.
  • Keywords
    field programmable gate arrays; invasive software; logic circuits; FPGA-based protection scheme; HTH; dummy logic; hardware Trojan horse insertion; logic resources; malicious attacks; security threat; Field programmable gate arrays; Hardware; Resource management; Routing; Table lookup; Trojan horses; Wires; Design for hardware trust; field-programmable gate arrays (FPGAs); hardware trojan horse;
  • fLanguage
    English
  • Journal_Title
    Embedded Systems Letters, IEEE
  • Publisher
    ieee
  • ISSN
    1943-0663
  • Type

    jour

  • DOI
    10.1109/LES.2015.2406791
  • Filename
    7047801