Trojan detection via delay measurements: An approach to select paths and vectors to maximize effectiveness and minimize cost
نویسندگان
چکیده
One of the growing issues in IC design is how to authenticate chips fabricated by untrusted vendors. Such authentication, often called Trojan detection, is challenging since the specifics of hardware Trojans inserted by intelligent adversaries are difficult to predict and most Trojans do not affect the logic behavior of the circuit unless they are activated. Also, Trojan detection via parametric measurements becomes increasingly difficult with increasing levels of process variations. In this paper we introduce the new notion of a set of surrogate Trojan targets, where the surrogates capture the necessary conditions that every Trojan must satisfy. We also propose a method that maximizes the resolution of each path delay measurement, in terms of its ability to detect the targeted surrogate. In particular, for each surrogate, our approach accentuates the surrogate’s impact by generating a vector that sensitizes the shortest path passing via the surrogate’s site. We estimate the minimum number of chips to which each vector must be applied to detect the surrogate with sufficient confidence for a given level of process variations. Finally, we demonstrate the significant improvements in effectiveness and cost provided by our approach under high process variations. Experimental results on several benchmark circuits show that we can achieve 3.48X reduction in test cost using our approach compared to classical path delay testing with Student’s t-test.
منابع مشابه
Hardwar Trojan classification and implementation and offer a new detection approach
A hardware attack that enables the attacker to alter the main circuit with malicious hardware during either design or the fabrication process is studied and analyzed. This attack, known as the hardware Trojan, has different objectives such as destroying hardware, changing circuit characteristics or extracting sensitive information. So hardware Trojan detection and hardware security are critical...
متن کاملSecurity-aware register placement to hinder malicious hardware updating and improve Trojan detectability
Nowadays, bulk of the designers prefer to outsource some parts of their design and fabrication process to the third-part companies due to the reliability problems, manufacturing cost and time-to-market limitations. In this situation, there are a lot of opportunities for malicious alterations by the off-shore companies. In this paper, we proposed a new placement algorithm that hinders the hardwa...
متن کاملHardware Trojan Identification and Detection
The majority of techniques developed to detect hardware trojans are based on specific attributes. Further, the ad hoc approaches employed to design methods for trojan detection are largely ineffective. Hardware trojans have a number of attributes which can be used to systematically develop detection techniques. Based on this concept, a detailed examination of current trojan detection techniques...
متن کاملA Flexible Job Shop Scheduling Problem with Controllable Processing Times to Optimize Total Cost of Delay and Processing
In this paper, the flexible job shop scheduling problem with machine flexibility and controllable process times is studied. The main idea is that the processing times of operations may be controlled by consumptions of additional resources. The purpose of this paper to find the best trade-off between processing cost and delay cost in order to minimize the total costs. The proposed model, flexibl...
متن کاملA Novel Hybrid Approach to Analyze Cost of Quality: Balanced Scorecard and Fuzzy Logic
In this paper, a new methodology in the area of cost of quality (COQ) is proposed to determine the optimal investment allocation to all costs. The goal is to minimize costs involved in achieving a required level of quality. The contribution of this paper is fourfold: (I) considering two types of weights for each part of COQ, in which the first type is determined by the cost volume and the secon...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2012