DocumentCode :
619577
Title :
The undetectable and unprovable hardware Trojan horse
Author :
Wei, Sheng ; Potkonjak, Miodrag
Author_Institution :
Computer Science Department, University of California, Los Angeles (UCLA), 90095, USA
fYear :
2013
fDate :
May 29 2013-June 7 2013
Firstpage :
1
Lastpage :
2
Abstract :
We have developed an approach for automatic embedding of customizable hardware Trojan horses (HTHs) into an arbitrary finite state machine. The HTH can be used to facilitate a variety of security attacks and does not require any additional gates, because it is morphed into the specified design. Even after the HTH induces provable damage, one is not capable of proving that any malicious circuitry is embedded into the design. The main ramification of the developed HTH is that hardware and system techniques should move from HTH detection toward synthesis for trusted systems.
Keywords :
Delays; Hardware; Integrated circuit modeling; Solid modeling; Trojan horses;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Design Automation Conference (DAC), 2013 50th ACM/EDAC/IEEE
Conference_Location :
Austin, TX, USA
ISSN :
0738-100X
Type :
conf
Filename :
6560737
Link To Document :
بازگشت