Hardware Trust through Layout Filling: a Hardware Trojan Prevention Technique

被引:18
|
作者
Ba, Papa-Sidy [1 ]
Dupuis, Sophie [1 ]
Palanichamy, Manikandan [1 ]
Marie-Lise-Flottes [1 ]
Di Natale, Giorgio [1 ]
Rouzeyre, Bruno [1 ]
机构
[1] Univ Montpellier, CNRS UMR 5506, LIRMM, Montpellier, France
关键词
Harware-Trojans; Design-for-Hardware-Trust; Layout; Placement and routing; THREAT;
D O I
10.1109/ISVLSI.2016.22
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The insertion of malicious alterations to a circuit, referred to as Hardware Trojans, is a threat considered more and more seriously during the last years. Numerous methods have been proposed in the literature to detect the presence of such alterations. More recently, Design-for-Hardware-Trust (DfHT) methods have been proposed, that enhance the design of the circuit in order to incorporate features that can either prevent the insertion of a HT or that can help detection methods. This paper focuses on a HT prevention technique that aims at creating a layout without filler cells, which are assumed to provide a great opportunity for HT insertion, in order to make the insertion of a HT in a layout as difficult as possible.
引用
收藏
页码:254 / 259
页数:6
相关论文
共 50 条
  • [41] Hardware Trojan with Frequency Modulation
    Luft, Ash
    Sima, Mihai
    Mcguire, Michael
    2021 IEEE 12TH LATIN AMERICA SYMPOSIUM ON CIRCUITS AND SYSTEM (LASCAS), 2021,
  • [42] Implementing Hardware Trojans: Experiences from a Hardware Trojan Challenge
    Becker, Georg T.
    Lakshminarasimhan, Ashwin
    Lin, Lang
    Srivathsa, Sudheendra
    Suresh, Vikram B.
    Burelson, Wayne
    2011 IEEE 29TH INTERNATIONAL CONFERENCE ON COMPUTER DESIGN (ICCD), 2011, : 301 - 304
  • [43] A method of implanting combinational hardware Trojan based on evolvable hardware
    Liu, Lijun
    Wang, Tao
    Wang, Xiaohan
    He, Tianyu
    COMPUTERS & ELECTRICAL ENGINEERING, 2021, 93
  • [44] Scalable Hardware Trojan Diagnosis
    Wei, Sheng
    Potkonjak, Miodrag
    IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 2012, 20 (06) : 1049 - 1057
  • [45] A Multidimensional Hardware Trojan Design Platform to Enhance Hardware Security
    Das, Nilanjana
    Hasler, Mattis
    Pauls, Friedrich
    Haas, Sebastian
    IEEE EMBEDDED SYSTEMS LETTERS, 2025, 17 (01) : 46 - 49
  • [46] Hardware Trojan Prevention and Detection by Filling Unused Space Using Shift registers, Gate-chain and Extra Routing
    Labafniya, Mansoureh
    Borujeni, Shahram Etemadi
    Saeidi, Roghayeh
    ISECURE-ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2021, 13 (01): : 47 - 57
  • [47] Hardware Trojan Detection through Information Flow Security Verification
    Nahiyan, Adib
    Sadi, Mehdi
    Vittal, Rahul
    Contreras, Gustavo
    Forte, Domenic
    Tehranipoor, Mark
    2017 IEEE INTERNATIONAL TEST CONFERENCE (ITC), 2017,
  • [48] Analysis of Hardware Trojan Resilience Enabled through Logic Locking
    Cruz, Jonathan
    Gaikwad, Pravin
    Bhunia, Swarup
    2022 ASIAN HARDWARE ORIENTED SECURITY AND TRUST SYMPOSIUM (ASIANHOST), 2022,
  • [49] A Novel Algorithm for Hardware Trojan Detection Through Reverse Engineering
    Rajendran, Sreeja
    Regeena, Mary Lourde
    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2022, 41 (04) : 1154 - 1166
  • [50] Detecting hardware Trojan through feature extraction in subspace domain
    Hu, A. (aqhu@seu.edu.cn), 1600, Southeast University (44):