How Logic Masking Can Improve Path Delay Analysis for Hardware Trojan Detection

被引:0
|
作者
Nejat, Arash [1 ]
Hely, David [1 ]
Beroulle, Vincent [1 ]
机构
[1] Univ Grenoble Alpes, LCIS, Valence, France
关键词
hardware security; design for hardware trust; logic masking; Hardware Trojan detection; IC piracy;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Hardware Trojan (HT), Integrated Circuit (IC) piracy, and overproduction are three important threats which may happen in untrusted foundries. Modifying structurally the IC design at different abstraction level to counter the HT threats is known as Design-For-Hardware-Trust (DFHT). DFHT methods are used in order to facilitate HT detection methods. In addition, logic masking has been proposed against IC piracy and overproduction. Logic masking modifies the circuit such that it does not work correctly without applying the correct key. In this paper, we propose a DFHT method reusing logic masking approach. The proposed DFHT method modifies the design to improve the HT detection methods that are based on the path delay analysis. The objective of the proposed approach is to generate fake short paths for nets which only belong to long paths, because the delay of shorter paths varies less than longer ones. Our experiments, after technology mapping, show that the proposed DFHT method increases the HT detectability and also provides the advantages of usual logic masking methods.
引用
收藏
页码:424 / 427
页数:4
相关论文
共 50 条
  • [21] Efficient Hardware Trojan Detection with Differential Cascade Voltage Switch Logic
    Danesh, Wafi
    Dofe, Jaya
    Yu, Qiaoyan
    VLSI DESIGN, 2014,
  • [22] Analysis of Hardware Trojan Resilience Enabled through Logic Locking
    Cruz, Jonathan
    Gaikwad, Pravin
    Bhunia, Swarup
    2022 ASIAN HARDWARE ORIENTED SECURITY AND TRUST SYMPOSIUM (ASIANHOST), 2022,
  • [23] Efficient hardware Trojan detection with differential cascade voltage switch logic
    Danesh, Wafi
    Dofe, Jaya
    Yu, Qiaoyan
    VLSI Design, 2014, 2014
  • [24] Detection of Hardware Trojan in Presence of Sneak Path in Memristive Nanocrossbar Circuits
    Basu, Subhashree
    Kule, Malay
    Rahaman, Hafizur
    2021 4TH INTERNATIONAL SYMPOSIUM ON DEVICES, CIRCUITS AND SYSTEMS (ISDCS 2021), 2021,
  • [25] A security method of hardware Trojan detection using path tracking algorithm
    Huang, Der-Chen
    Hsiao, Chun-Fang
    Chang, Tin-Wei
    Chu, Ying-Yi
    EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2022, 2022 (01)
  • [26] Hardware Trojan Detection Based on Path Feature and Support Vector Machine
    Yan, Feng
    Lan, Chen
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2023, 45 (06) : 1921 - 1932
  • [27] A security method of hardware Trojan detection using path tracking algorithm
    Der-Chen Huang
    Chun-Fang Hsiao
    Tin-Wei Chang
    Ying-Yi Chu
    EURASIP Journal on Wireless Communications and Networking, 2022
  • [28] Detection of Hardware Trojan in Presence of Sneak Path in Memristive Nanocrossbar Circuits
    Basu, Subhashree
    Kule, Malay
    Rahaman, Hafizur
    4th International Symposium on Devices, Circuits and Systems, ISDCS 2021 - Conference Proceedings, 2021,
  • [29] Power Analysis-based Hardware Trojan Detection
    Xue, Hao
    Li, Shuo
    Ren, Saiyu
    2017 IEEE NATIONAL AEROSPACE AND ELECTRONICS CONFERENCE (NAECON), 2017, : 253 - 257
  • [30] Hardware Trojan Detection Through Temperature Characteristics Analysis
    Zhong Jingxin
    Wang Jianye
    Kan Baoqiang
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2018, 40 (03) : 743 - 749