Electromigration based Hardware Trojan Defense in Integrated Circuit

被引:0
|
作者
Yin, Binyu [1 ]
Cai, Linlin [1 ]
Zhang, Haoyu [1 ]
Chen, Wangyong [1 ]
机构
[1] Sun Yat Sen Univ, Sch Microelect Sci & Technol, Guangzhou 510275, Guangdong, Peoples R China
基金
中国国家自然科学基金;
关键词
Hardware Trojans; electromigration; simulation; faliure analysis; STRESS EVOLUTION; RELIABILITY;
D O I
10.1109/ISEDA62518.2024.10617898
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Recently, Hardware Trojans are gaining increasing attention due to their ability to cause damage to critical circuits through covert attack methods, which poses significant threats to electronic systems. Among the various attack methods of Hardware Trojans, those based on electromigration (EM) induced circuit aging are particularly feasible. In this paper, we investigate Hardware Trojan defense in integrated circuits based on an advanced three-dimensional physical electromigration model. By extracting characteristic structures from specific circuits, we conduct the electromigration failure analysis and propose Hardware Trojan defense strategy based on specific interconnect structures. Through these works, we demonstrate the vulnerable attacking locations of different interconnect structures and provide the guidance for electromigration based Hardware Trojans defense in IC design.
引用
收藏
页码:504 / 509
页数:6
相关论文
共 50 条
  • [41] Design of Hardware Trojan Horse Based on Counter
    Liu, Huafeng
    Luo, Hongwei
    Wang, Liwei
    2011 INTERNATIONAL CONFERENCE ON QUALITY, RELIABILITY, RISK, MAINTENANCE, AND SAFETY ENGINEERING (ICQR2MSE), 2011, : 1007 - 1009
  • [42] Trojan defense
    Schultz, E
    COMPUTERS & SECURITY, 2003, 22 (08) : 660 - 661
  • [43] Hardware Trojan Detection Based on Image Comparison
    Sun, Chen
    Guo, Xiaohui
    Li, Lingling
    Ma, Jingjing
    Lecture Notes on Data Engineering and Communications Technologies, 2022, 80 : 979 - 986
  • [44] Hardware Trojan Detection Based on Logical Testing
    Bazzazi, Amin
    Shalmani, Mohammad Taghi Manzuri
    Hemmatyar, Ali Mohammad Afshin
    JOURNAL OF ELECTRONIC TESTING-THEORY AND APPLICATIONS, 2017, 33 (04): : 381 - 395
  • [45] Hardware Trojan Detection Based on the Distance Discrimination
    Wang Jianxin
    Wang Boren
    Qu Ming
    Zhang Lei
    Xiao Chaoen
    2016 FIRST IEEE INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND THE INTERNET (ICCCI 2016), 2016, : 404 - 407
  • [46] Design of hardware trojan horse based on counter
    Liu, Huafeng
    Luo, Hongwei
    Wang, Liwei
    ICQR2MSE 2011 - Proceedings of 2011 International Conference on Quality, Reliability, Risk, Maintenance, and Safety Engineering, 2011, : 1007 - 1009
  • [47] Hardware Trojan Detection Based on Signal Correlation
    Zhao, Wei
    Shen, Haihua
    Li, Huawei
    Li, Xiaowei
    2018 IEEE 27TH ASIAN TEST SYMPOSIUM (ATS), 2018, : 80 - 85
  • [48] Hardware Trojan Detection Based on Logical Testing
    Amin Bazzazi
    Mohammad Taghi Manzuri Shalmani
    Ali Mohammad Afshin Hemmatyar
    Journal of Electronic Testing, 2017, 33 : 381 - 395
  • [49] Hardware Trojans: The Defense and Attack of Integrated Circuits
    Reece, Trey
    Robinson, William H.
    2011 IEEE 29TH INTERNATIONAL CONFERENCE ON COMPUTER DESIGN (ICCD), 2011, : 293 - 296
  • [50] Hardware Trojans: The defense and attack of integrated circuits
    Vanderbilt University, EECS Department, Nashville, TN, United States
    Proc IEEE Int Conf Comput Des VLSI Comput Process, 2011, (293-296):