Hardware Trust through Layout Filling: a Hardware Trojan Prevention Technique

被引:18
|
作者
Ba, Papa-Sidy [1 ]
Dupuis, Sophie [1 ]
Palanichamy, Manikandan [1 ]
Marie-Lise-Flottes [1 ]
Di Natale, Giorgio [1 ]
Rouzeyre, Bruno [1 ]
机构
[1] Univ Montpellier, CNRS UMR 5506, LIRMM, Montpellier, France
关键词
Harware-Trojans; Design-for-Hardware-Trust; Layout; Placement and routing; THREAT;
D O I
10.1109/ISVLSI.2016.22
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The insertion of malicious alterations to a circuit, referred to as Hardware Trojans, is a threat considered more and more seriously during the last years. Numerous methods have been proposed in the literature to detect the presence of such alterations. More recently, Design-for-Hardware-Trust (DfHT) methods have been proposed, that enhance the design of the circuit in order to incorporate features that can either prevent the insertion of a HT or that can help detection methods. This paper focuses on a HT prevention technique that aims at creating a layout without filler cells, which are assumed to provide a great opportunity for HT insertion, in order to make the insertion of a HT in a layout as difficult as possible.
引用
收藏
页码:254 / 259
页数:6
相关论文
共 50 条
  • [1] A hardware Trojan insertion prevention method based on layout filling with A2-RO circuit
    Li Z.
    He J.
    Ma H.
    Liu Y.
    Qin G.
    Zhao Y.
    Beijing Hangkong Hangtian Daxue Xuebao/Journal of Beijing University of Aeronautics and Astronautics, 2022, 48 (03): : 514 - 521
  • [2] Hardware Trojan Prevention using Layout-Level Design Approach
    Ba, Papa-Sidy
    Palanichamy, Manikandan
    Dupuis, Sophie
    Flottes, Marie-Lise
    Di Natale, Giorgio
    Rouzeyre, Bruno
    2015 EUROPEAN CONFERENCE ON CIRCUIT THEORY AND DESIGN (ECCTD), 2015, : 129 - 132
  • [3] On the feasibility of using evolvable hardware for hardware Trojan detection and prevention
    Labafniya, Mansoureh
    Picek, Stjepan
    Borujeni, Shahram Etemadi
    Mentens, Nele
    APPLIED SOFT COMPUTING, 2020, 91
  • [4] Hardware Trojan Prevention Through Limiting Access to the Active Region
    Supon, Tareq Muhammad
    Seyedbarhagh, Mahsasadat
    Rashidzadeh, Rashid
    Muscedere, Roberto
    2019 14TH IEEE INTERNATIONAL CONFERENCE ON DESIGN & TECHNOLOGY OF INTEGRATED SYSTEMS IN NANOSCALE ERA (DTIS 2019), 2019,
  • [5] Vulnerability Analysis of a Circuit Layout to Hardware Trojan Insertion
    Salmani, Hassan
    Tehranipoor, Mark M.
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (06) : 1214 - 1225
  • [6] Automatic Feature Selection of Hardware Layout: A Step toward Robust Hardware Trojan Detection
    Abdurrahman A. Nasr
    Mohamed Z. Abdulmageed
    Journal of Electronic Testing, 2016, 32 : 357 - 367
  • [7] Automatic Feature Selection of Hardware Layout: A Step toward Robust Hardware Trojan Detection
    Nasr, Abdurrahman A.
    Abdulmageed, Mohamed Z.
    JOURNAL OF ELECTRONIC TESTING-THEORY AND APPLICATIONS, 2016, 32 (03): : 357 - 367
  • [8] A Survey of Hardware Trojan Detection, Diagnosis and Prevention
    Li, He
    Liu, Qiang
    Zhang, Jiliang
    Lyu, Yongqiang
    2015 14TH INTERNATIONAL CONFERENCE ON COMPUTER-AIDED DESIGN AND COMPUTER GRAPHICS (CAD/GRAPHICS), 2015, : 173 - 180
  • [9] Overview of Hardware Trojan Detection and Prevention Methods
    Francq, Julien
    Frick, Florian
    2015 EUROPEAN CONFERENCE ON CIRCUIT THEORY AND DESIGN (ECCTD), 2015, : 65 - 68
  • [10] Hardware Trojan prevention using memristor technology
    Supon, Tareq Muhammad
    Rashidzadeh, Rashid
    MICROPROCESSORS AND MICROSYSTEMS, 2023, 102