• DocumentCode
    258610
  • Title

    Smart employment of circuit redundancy to effectively counter trojans (SECRET) in third-party IP cores

  • Author

    Farag, Mohammed M. ; Ewais, Mohammad A.

  • Author_Institution
    Dept. of Electr. Eng., Alexandria Univ., Alexandria, Egypt
  • fYear
    2014
  • fDate
    8-10 Dec. 2014
  • Firstpage
    1
  • Lastpage
    6
  • Abstract
    Hardware Trojan horses (HTHs) are malicious inclusions or alterations to hardware designs developed and supplied by untrusted parties. The emerging threat of HTHs has a direct impact on the FPGA design community which mainly relies on third-party IP (3PIP) cores and design reuse practices. Efficient design and detection of HTHs have been the main interest of most related research work, but countermeasures against HTHs have not attained sufficient attention. We advance a novel approach promoting Smart Employment of Circuit Redundancy to Effectively Counter Trojans (SECRET) in 3PIP cores employed in reconfigurable hardware designs. Two identical instances of the protected IP core are employed for observation and operating purposes and a time shift is created between the two core inputs. Trojan detection circuitry is inserted during the design-time to monitor the observation core at run-time. Once a Trojan is detected in the observation core, the operating core with the delayed input is suspended or the identified triggering inputs are isolated for a specific period of time to bypass the Trojan activating trigger. We present the SECRET high-level architecture, a proof-of-concept application to a 3PIP crypto core containing an HTH of our design. The prototype is designed and validated on a Spartan-3 FPGA. Simulation and implementation results show the SECRET feasibility and effectiveness.
  • Keywords
    cryptography; field programmable gate arrays; invasive software; logic design; reconfigurable architectures; redundancy; 3PIP crypto core; FPGA design community; HTH; SECRET high-level architecture; Spartan-3 FPGA; Trojan activating trigger; Trojan detection circuitry; design reuse practices; field programmable gate array; hardware Trojan horses; malicious alterations; malicious inclusions; reconfigurable hardware designs; smart employment of circuit redundancy to effectively counter Trojans; third-party IP cores; untrusted parties; Discrete Fourier transforms; Hardware; IP networks; Monitoring; Payloads; Trojan horses; Hardware Trojan; Reconfigurable Hardware; Run-time Countermeasure; Third-Party IP Core;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    ReConFigurable Computing and FPGAs (ReConFig), 2014 International Conference on
  • Conference_Location
    Cancun
  • Print_ISBN
    978-1-4799-5943-3
  • Type

    conf

  • DOI
    10.1109/ReConFig.2014.7032562
  • Filename
    7032562