DocumentCode :
614335
Title :
Defeating hardware spyware in third party IPs
Author :
Al-Anwar, Amr ; Alkabani, Yousra ; El-Kharashi, M. Watheq ; Bedour, Hassan
Author_Institution :
Comput. & Syst. Eng. Dept., Ain Shams Univ., Cairo, Egypt
fYear :
2013
fDate :
27-30 April 2013
Firstpage :
1
Lastpage :
5
Abstract :
Hardware spyware detection is a very critical topic, especially as untrusted third parties contribute in designing and/or manufacturing. Comparing a suspected design with a golden one is the most common way to detect hardware Trojans. But, this methodology cannot be used with third party IPs, as we have no golden IP to compare with. In this work, we present a novel technique for system protection that alleviates the need for a golden chip. We aim to decrease the ability of leaking sensitive information by infected IPs. We use IPs output multiplexing and cyclic redundancy check to achieve negligible probability of losing sensitive information and to detect IP Spyware. We show the practicality of the introduced schemes by implementing the provided methodologies on a FPGA. Experimental results illustrate a negligible delay overhead while the area and power overheads can be tolerated for critical systems information security.
Keywords :
field programmable gate arrays; invasive software; FPGA; IP spyware detection; area overhead; cyclic redundancy check; delay overhead; hardware Trojans detection; hardware spyware detection; output multiplexing; power overhead; suspected design; system information security; system protection; third party IP; Delays; Hardware; IP networks; Multiplexing; Spyware; Table lookup; Trojan horses; Hardware attack; hardware trojan; spywares; third-party IP;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Electronics, Communications and Photonics Conference (SIECPC), 2013 Saudi International
Conference_Location :
Fira
Print_ISBN :
978-1-4673-6196-5
Electronic_ISBN :
978-1-4673-6194-1
Type :
conf
DOI :
10.1109/SIECPC.2013.6550785
Filename :
6550785
Link To Document :
بازگشت