A Post-Deployment IC Trust Evaluation Architecture

被引:0
|
作者
Jin, Yier [1 ]
Mauliuk, Dzmitry [3 ]
Makris, Yiorgos [2 ]
机构
[1] Univ Cent Florida, Dept Elect Engn & Comp Sci, Orlando, FL 32816 USA
[2] Univ Texas Dallas, Dept Elect Engn, Richardson, TX 75083 USA
[3] Yale Univ, Dept Elect Engn, New Haven, CT 06520 USA
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The use of side-channel parametric measurements along with statistical analysis methods for detecting hardware Trojans in fabricated integrated circuits has been studied extensively in recent years, initially for digital designs but recently also for their analog/RF counterparts. Such post-fabrication trust evaluation methods, however, are unable to detect dormant hardware Trojans which are activated after a circuit is deployed in its field of operation. For the latter, an on-chip trust evaluation method is required. To this end, we present a general architecture for post-deployment trust evaluation based on on-chip classifiers. Specifically, we discuss the design of an on-chip analog neural network which can be trained to distinguish trusted from untrusted circuit functionality based on simple measurements obtained via on-chip measurement acquisition sensors. The proposed method is demonstrated using a Trojan-free and two Trojan-infested variants of a wireless cryptographic IC design, as well as a fabricated programmable neural network experimentation chip. As corroborated by the obtained experimental results, two current measurements suffice for the on-chip classifier to effectively assess trustworthiness and, thereby, detect hardware Trojans that are activated after chip deployment.
引用
收藏
页码:224 / +
页数:2
相关论文
共 50 条
  • [1] Post-Deployment Trust Evaluation in Wireless Cryptographic ICs
    Jin, Yier
    Maliuk, Dzmitry
    Makris, Yiorgos
    [J]. DESIGN, AUTOMATION & TEST IN EUROPE (DATE 2012), 2012, : 965 - 970
  • [2] Post-deployment trust evaluation in wireless cryptographic ICs
    Jin, Yier
    Maliuk, Dzmitry
    Makris, Yiorgos
    [J]. Proceedings -Design, Automation and Test in Europe, DATE, 2012, : 965 - 970
  • [3] Post-deployment usability evaluation of a radiology workstation
    Jorritsma, Wiard
    Cnossen, Fokie
    Dierckx, Rudi A.
    Oudkerk, Matthijs
    Van Ooijen, Peter M. A.
    [J]. INTERNATIONAL JOURNAL OF MEDICAL INFORMATICS, 2016, 85 (01) : 28 - 35
  • [4] Cardiopulmonary Exercise Testing In The Evaluation Of Post-Deployment Dyspnea
    Morris, M. J.
    Skabelund, A. J.
    Hiles, P. D.
    Collen, J.
    Lucero, P.
    [J]. AMERICAN JOURNAL OF RESPIRATORY AND CRITICAL CARE MEDICINE, 2015, 191
  • [5] Post-deployment configuration management
    Heimbigner, D
    Wolf, AL
    [J]. SOFTWARE CONFIGURATION MANAGEMENT, 1996, 1167 : 272 - 276
  • [6] DEVELOPMENT AND PRELIMINARY EVALUATION OF A BRIEF INTERVENTION FOR POST-DEPLOYMENT INSOMNIA
    Mellman, T. Howell
    [J]. SLEEP, 2020, 43 : A188 - A188
  • [8] Post-Deployment Usability: A Survey of Current Practices
    Chilana, Parmit K.
    Ko, Andrew J.
    Wobbrock, Jacob O.
    Grossman, Tovi
    Fitzmaurice, George
    [J]. 29TH ANNUAL CHI CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS, 2011, : 2243 - 2246
  • [9] Relations between post-deployment divorce/separation and deployment and post-deployment stressors, social support, and symptomatology in Veterans with combat-related PTSD symptoms
    Gros, Daniel F.
    Lancaster, Cynthia L.
    Teves, Jenna B.
    Libet, Julian
    Acierno, Ron
    [J]. JOURNAL OF MILITARY VETERAN AND FAMILY HEALTH, 2019, 5 (02): : 125 - 135
  • [10] Post-Deployment Modifications of Stent with Endothelial Cells
    Fishbein, Ilia
    Alferiev, Ivan S.
    Adamo, Richard F.
    Guerrero, David T.
    Tang, Yanqing
    Chorny, Michael
    Levy, Robert J.
    [J]. MOLECULAR THERAPY, 2016, 24 : S68 - S68