...
首页> 外文期刊>IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems >Detection of Hardware Trojans in Third-Party Intellectual Property Using Untrusted Modules
【24h】

Detection of Hardware Trojans in Third-Party Intellectual Property Using Untrusted Modules

机译:使用不受信任的模块检测第三方知识产权中的硬件木马

获取原文
获取原文并翻译 | 示例
           

摘要

During the design of an integrated circuit, there are several opportunities for adversaries to make malicious modifications or insertions to a design. These attacks, known as hardware Trojans, can have catastrophic effects on a circuit if left undetected. This paper describes a technique for identifying hardware Trojans with logic-based payloads that are hidden within third-party intellectual property. Through comparison of two similar but untrusted designs, functional differences can be identified for all possible input combinations within a window of time. This technique was tested on multiple Trojan benchmarks and was found to be very effective, both in detectability and in speed of testing. As this technique has very low costs to implement, it represents an easy way for designers to gain a level of trust in previously untrusted designs.
机译:在集成电路的设计过程中,对手有很多机会对设计进行恶意修改或插入。如果未被发现,这些称为硬件木马的攻击可能会对电路造成灾难性影响。本文介绍了一种用于识别硬件木马的技术,该木马具有隐藏在第三方知识产权中的基于逻辑的有效负载。通过比较两个相似但不可信的设计,可以在一段时间内为所有可能的输入组合识别功能差异。该技术已在多个Trojan基准上进行了测试,并且在可检测性和测试速度方面都非常有效。由于该技术的实施成本非常低,因此它为设计人员提供了一种获得以前不受信任的设计的信任度的简便方法。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号