Hardware trojan detection methodology for FPGA

Amr Al-Anwar, Yousra Alkabani, M. Watheq El-Kharashi, Hassan Bedour

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

14 Scopus citations

Abstract

Nowadays, hardware Trojan protection became a hot topic especially after the horizontal silicon industry business model. Third party IPs are the building blocks of many critical systems and that arises the question of confidentiality and reliability of these blocks. In this work, we present novel methods for system protection and Trojan detection that alleviate the need for a golden chip. In addition, we introduce a scenario to dynamically remove infected IPs embedded on FPGAs. We propose multiplexing reconfigurable IPs' outputs and a CRC Trojan detection schema to detect Hardware Trojan. Dynamic Trojan detection is done using multiple variant voting. We show the practicality of the introduced schemes by providing a proof of concept implementation of the different methodologies on FPGAs. We investigate methods' overhead to provide superior security properties that can be used in critical and strategically important systems.

Original languageEnglish
Title of host publication2013 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing, PACRIM 2013
Pages177-182
Number of pages6
DOIs
StatePublished - 2013
Externally publishedYes
Event14th IEEE Pacific Rim Conference on Communications, Computers, and Signal Processing, PACRIM 2013 - Vancouver, BC, Canada
Duration: 27 Aug 201329 Aug 2013

Publication series

NameIEEE Pacific RIM Conference on Communications, Computers, and Signal Processing - Proceedings

Conference

Conference14th IEEE Pacific Rim Conference on Communications, Computers, and Signal Processing, PACRIM 2013
Country/TerritoryCanada
CityVancouver, BC
Period27/08/1329/08/13

Fingerprint

Dive into the research topics of 'Hardware trojan detection methodology for FPGA'. Together they form a unique fingerprint.

Cite this