Abstract
Fabrication-less design houses outsource their designs to third-party foundries to lower fabrication cost. However, this creates opportunities for a rogue in the semiconductor foundry to introduce hardware Trojans, which stay inactive most of the time and cause unintended consequences to the system when triggered. Hardware Trojans in traditional CMOS-based circuits have been studied, and Design-for-Trust (DFT) techniques have been proposed to detect them. Different from traditional circuits in many ways, reversible circuits implement one-to-one input/output mappings. In this paper, we investigate the security implications of reversible circuits with a particular focus on the susceptibility to hardware Trojans. To this end, we consider reversible functions implemented using reversible circuits as well as irreversible functions embedded in reversible circuits.
Original language | English |
---|---|
Article number | 8331941 |
Pages (from-to) | 960-972 |
Number of pages | 13 |
Journal | IEEE Transactions on Emerging Topics in Computing |
Volume | 8 |
Issue number | 4 |
DOIs | |
State | Published - 2020 |
Externally published | Yes |
Keywords
- Hardware Trojans
- ancillary inputs
- design for trust
- reversible circuits
- scrambling