Hardware Trust through Layout Filling: a Hardware Trojan Prevention Technique

被引:18
|
作者
Ba, Papa-Sidy [1 ]
Dupuis, Sophie [1 ]
Palanichamy, Manikandan [1 ]
Marie-Lise-Flottes [1 ]
Di Natale, Giorgio [1 ]
Rouzeyre, Bruno [1 ]
机构
[1] Univ Montpellier, CNRS UMR 5506, LIRMM, Montpellier, France
关键词
Harware-Trojans; Design-for-Hardware-Trust; Layout; Placement and routing; THREAT;
D O I
10.1109/ISVLSI.2016.22
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The insertion of malicious alterations to a circuit, referred to as Hardware Trojans, is a threat considered more and more seriously during the last years. Numerous methods have been proposed in the literature to detect the presence of such alterations. More recently, Design-for-Hardware-Trust (DfHT) methods have been proposed, that enhance the design of the circuit in order to incorporate features that can either prevent the insertion of a HT or that can help detection methods. This paper focuses on a HT prevention technique that aims at creating a layout without filler cells, which are assumed to provide a great opportunity for HT insertion, in order to make the insertion of a HT in a layout as difficult as possible.
引用
收藏
页码:254 / 259
页数:6
相关论文
共 50 条
  • [31] A practical test patterns generation technique for hardware trojan detection
    Fang, Lei
    Li, Lei
    Li, Zhen
    1600, Electrotechnical Society of Slovenia (80): : 266 - 270
  • [32] Hardware Trojan Detection Technique Based on SOM Neural Network
    Wen, Ning
    Wang, Jian
    Zhang, Tao
    2018 EIGHTH INTERNATIONAL CONFERENCE ON INSTRUMENTATION AND MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC 2018), 2018, : 1645 - 1648
  • [33] An Effective and Sensitive Scan Segmentation Technique for Detecting Hardware Trojan
    Hossain, Fakir Sharif
    Yoneda, Tomokazu
    Inoue, Michiko
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2017, E100D (01): : 130 - 139
  • [34] Hardware Trojan Mitigation Technique in Network-on-Chip (NoC)
    Hussain, Musharraf
    Baloach, Naveed Khan
    Ali, Gauhar
    ElAffendi, Mohammed
    Dhaou, Imed Ben
    Ullah, Syed Sajid
    Uddin, Mueen
    MICROMACHINES, 2023, 14 (04)
  • [35] A Practical Test Patterns Generation Technique for Hardware Trojan Detection
    Fang, Lei
    Li, Lei
    Li, Zhen
    ELEKTROTEHNISKI VESTNIK-ELECTROCHEMICAL REVIEW, 2013, 80 (05): : 266 - 270
  • [36] Detecting Hardware Trojan through Time Domain Constrained Estimator Based Unified Subspace Technique
    Xue, Mingfu
    Liu, Wei
    Hu, Aiqun
    Wang, Youdong
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2014, E97D (03) : 606 - 609
  • [37] Trust of Hardware
    Zhang Fan
    Wu Guoqing
    Tao Jun
    Yuan Mengting
    Liu Xiaoli
    2008 INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS SYMPOSIA, PROCEEDINGS, 2008, : 202 - +
  • [38] Hardware Trojan for Security LSI
    Yoshikawa, M.
    Satoh, R.
    Kumaki, T.
    2013 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS (ICCE), 2013, : 29 - +
  • [39] Advances in Hardware Trojan Detection
    Vaidya, Jaideep
    COMPUTER, 2019, 52 (06) : 4 - 5
  • [40] Hardware Trojan for security LSI
    Yoshikawa, M.
    Satoh, R.
    Kumaki, T.
    Digest of Technical Papers - IEEE International Conference on Consumer Electronics, 2013, : 29 - 30