DocumentCode
78161
Title
FPGA-Based Protection Scheme against Hardware Trojan Horse Insertion Using Dummy Logic
Author
Khaleghi, Behnam ; Ahari, Ali ; Asadi, Hossein ; Bayat-Sarmadi, Siavash
Author_Institution
Dept. of Comput. Eng., Sharif Univ. of Technol., Tehran, Iran
Volume
7
Issue
2
fYear
2015
fDate
Jun-15
Firstpage
46
Lastpage
50
Abstract
Hardware trojan horses (HTH) have recently emerged as a major security threat for field-programmable gate arrays (FPGAs). Previous studies to protect FPGAs against HTHs may still leave a considerable amount of logic resources to be misused by malicious attacks. This letter presents a low-level HTH protection scheme for FPGAs by filling the unused resources with the proposed dummy logic. In the proposed scheme, we identify the unused resources at the device layout-level and offer dummy logic cells for different resources. The proposed HTH protection scheme has been applied on Xilinx Virtex devices implementing a set of IWLS benchmarks. The results show that by employing the proposed HTH protection scheme, the chance of logic abuse can be significantly reduced. Experimental results also show that as compared to nonprotected designs, the proposed HTH scheme imposes no performance and power penalties.
Keywords
field programmable gate arrays; invasive software; logic circuits; FPGA-based protection scheme; HTH; dummy logic; hardware Trojan horse insertion; logic resources; malicious attacks; security threat; Field programmable gate arrays; Hardware; Resource management; Routing; Table lookup; Trojan horses; Wires; Design for hardware trust; field-programmable gate arrays (FPGAs); hardware trojan horse;
fLanguage
English
Journal_Title
Embedded Systems Letters, IEEE
Publisher
ieee
ISSN
1943-0663
Type
jour
DOI
10.1109/LES.2015.2406791
Filename
7047801
Link To Document