BISA: Built-In Self-Authentication for Preventing Hardware Trojan Insertion

被引:0
|
作者
Xiao, Kan [1 ]
Tehranipoor, Mohammed [1 ]
机构
[1] Univ Connecticut, Dept Elect & Comp Engn, Storrs, CT 06260 USA
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Hardware Trojans have become a significant threat to government agencies and enterprises that require security and trustworss in systems with critical applications. Detecting hardware Trojans is very challenging because of the diversity of Trojans and unpredictable process variations during fabrication. In this paper, we propose a novel technique, called built-in self-authentication (NSA), that can fill unused spaces in a circuit layout by Innctional filler cells instead of non-functional filler cells. All functional filler cells -will be tested by BISA itself and a digital signature would be generated. Any modification on BISA will result in a different signature. Thus, BISA can he used to prevent Trojan insertion or make Trojan insertion extremely difficult. BISA can be applied to any single-module or bottom-up hierarchical design, and we evaluate it on different circuits to demonstrate the effective of this technique.
引用
下载
收藏
页码:45 / 50
页数:6
相关论文
共 20 条
  • [1] A Novel Built-In Self-Authentication Technique to Prevent Inserting Hardware Trojans
    Xiao, Kan
    Forte, Domenic
    Tehranipoor, Mohammed
    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2014, 33 (12) : 1778 - 1791
  • [2] A Sensor-Assisted Self-Authentication Framework for Hardware Trojan Detection
    Davoodi, Azadeh
    Li, Min
    Tehranipoor, Mohammad
    IEEE DESIGN & TEST, 2013, 30 (05) : 74 - 82
  • [3] A Sensor-Assisted Self-Authentication Framework for Hardware Trojan Detection
    Li, Min
    Davoodi, Azadeh
    Tehranipoor, Mohammad
    DESIGN, AUTOMATION & TEST IN EUROPE (DATE 2012), 2012, : 1331 - 1336
  • [4] Efficient and Secure Split Manufacturing via Obfuscated Built-In Self-Authentication
    Xiao, Kan
    Forte, Domenic
    Tehranipoor, Mark
    2015 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), 2015, : 14 - 19
  • [5] Obfuscated Built-In Self-Authentication With Secure and Efficient Wire-Lifting
    Shi, Qihang
    Tehranipoor, Mark M.
    Forte, Domenic
    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2019, 38 (11) : 1981 - 1994
  • [6] Securing Split Manufactured ICs with Wire Lifting Obfuscated Built-In Self-Authentication
    Shi, Qihang
    Xiao, Kan
    Forte, Domenic
    Tehranipoor, Mark M.
    PROCEEDINGS OF THE GREAT LAKES SYMPOSIUM ON VLSI 2017 (GLSVLSI' 17), 2017, : 339 - 344
  • [7] BHARKS: Built-in Hardware Authentication using Random Key Sequence
    Reddy, Manoj D.
    Akshay, K. P.
    Mohankumar, N.
    PROCEEDINGS OF 4TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING, COMPUTING AND CONTROL (ISPCC 2K17), 2017, : 200 - 204
  • [8] BUILT-IN HARDWARE FOR THE SELF-TESTING OF LSI CIRCUITS
    YARMOLIK, VN
    SOVIET MICROELECTRONICS, 1986, 15 (01): : 45 - 50
  • [9] Self-testing of cores-based embedded systems with built-in hardware
    Das, SR
    IEE PROCEEDINGS-CIRCUITS DEVICES AND SYSTEMS, 2005, 152 (05): : 539 - 546
  • [10] Built-in self-test quality assessment using hardware fault emulation in FPGAs
    Parreira, A
    Teixeira, JP
    Santos, MB
    COMPUTING AND INFORMATICS, 2004, 23 (5-6) : 537 - 556