Title :
A security-aware design scheme for better hardware Trojan detection sensitivity
Author :
Chongxi Bao ; Yang Xie ; Srivastava, Ankur
Author_Institution :
Dept. of ECE, Univ. of Maryland, College Park, MD, USA
Abstract :
Due to the trend of outsourcing designs to foundries overseas, there has been an increasing threat of malicious modifications to the original integrated circuits (ICs), also known as hardware Trojans. Numerous countermeasures have been proposed. However, very little effort has been made to design-time strategies that help to make test-time or run-time detection of Trojans easier. In this paper, we characterize each cell´s sensitivity to malicious modifications and develop an algorithm to select a subset of standard cells for a given circuit such that Trojans are easily detected using [1] when the circuit is synthesized on it. Experiments on 8 publicly available benchmarks show that using our method, we could detect on average 16.87% more Trojans with very small power/area overhead and no timing violations.
Keywords :
integrated circuits; invasive software; design-time strategies; hardware Trojan detection sensitivity; integrated circuits; security-aware design scheme; Benchmark testing; Hardware; Integrated circuits; Libraries; Standards; Timing; Trojan horses;
Conference_Titel :
Hardware Oriented Security and Trust (HOST), 2015 IEEE International Symposium on
Conference_Location :
Washington, DC
DOI :
10.1109/HST.2015.7140236