• DocumentCode
    3480943
  • Title

    Hardware Trojan Protection for Third Party IPs

  • Author

    Al-Anwar, Amr ; Alkabani, Yousra ; El-Kharashi, M. Watheq ; Bedour, Hassan

  • Author_Institution
    Comput. & Syst. Eng. Dept., Ain Shams Univ., Cairo, Egypt
  • fYear
    2013
  • fDate
    4-6 Sept. 2013
  • Firstpage
    662
  • Lastpage
    665
  • Abstract
    Hardware Trojan detection is a very important topic especially as parts of critical systems which are designed and/or manufactured by untrusted third parties. Most of the current research concentrates on detecting Trojans at the testing phase by comparing the suspected circuit to a golden (trusted) one. However, these attempts do not work in the case of third party IPs, which are black boxes with no golden IPs to trust. In this work, we present novel methods for system protection that alleviate the need for a golden chip. Protection against injected Trojan is done using simple blockage method. We show the practicality of the introduced schemes by providing a proof of concept implementation of the proposed methodology on FPGA. We showed that the overhead is low enough in the simple blockage method. The delay overhead is negligible while the power overhead does not exceed 2%.
  • Keywords
    field programmable gate arrays; logic design; trusted computing; FPGA; black boxes; critical systems; golden chip; hardware trojan protection; simple blockage method; system protection; third party IP; Benchmark testing; Cryptography; Delays; Hardware; IP networks; Standards; Trojan horses; backdoors; hardware; hardware attack; hardware trojan; security; third-party IP;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Digital System Design (DSD), 2013 Euromicro Conference on
  • Conference_Location
    Los Alamitos, CA
  • Type

    conf

  • DOI
    10.1109/DSD.2013.133
  • Filename
    6628342