Hardware trojan protection for third party IPs

Amr Al-Anwar, Yousra Alkabani, M. Watheq El-Kharashi, Hassan Bedour

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

17 Scopus citations

Abstract

Hardware Trojan detection is a very important topic especially as parts of critical systems which are designed and/or manufactured by untrusted third parties. Most of the current research concentrates on detecting Trojans at the testing phase by comparing the suspected circuit to a golden (trusted) one. However, these attempts do not work in the case of third party IPs, which are black boxes with no golden IPs to trust. In this work, we present novel methods for system protection that alleviate the need for a golden chip. Protection against injected Trojan is done using simple blockage method. We show the practicality of the introduced schemes by providing a proof of concept implementation of the proposed methodology on FPGA. We showed that the overhead is low enough in the simple blockage method. The delay overhead is negligible while the power overhead does not exceed 2%.

Original languageEnglish
Title of host publicationProceedings - 16th Euromicro Conference on Digital System Design, DSD 2013
Pages662-665
Number of pages4
DOIs
StatePublished - 2013
Externally publishedYes
Event16th Euromicro Conference on Digital System Design, DSD 2013 - Santander, Spain
Duration: 4 Sep 20136 Sep 2013

Publication series

NameProceedings - 16th Euromicro Conference on Digital System Design, DSD 2013

Conference

Conference16th Euromicro Conference on Digital System Design, DSD 2013
Country/TerritorySpain
CitySantander
Period4/09/136/09/13

Keywords

  • Backdoors
  • Hardware
  • Hardware attack
  • Hardware trojan
  • Security
  • Third-party IP

Fingerprint

Dive into the research topics of 'Hardware trojan protection for third party IPs'. Together they form a unique fingerprint.

Cite this