...
首页> 外文期刊>Journal of Electronic Testing >Security Against Hardware Trojan Attacks Using Key-Based Design Obfuscation
【24h】

Security Against Hardware Trojan Attacks Using Key-Based Design Obfuscation

机译:使用基于密钥的设计混淆对硬件木马攻击的安全性

获取原文
获取原文并翻译 | 示例
           

摘要

Malicious modification of hardware in untrusted fabrication facilities, referred to as hardware Trojan, has emerged as a major security concern. Comprehensive detection of these Trojans during post-manufacturing test has been shown to be extremely difficult. Hence, it is important to develop design techniques that provide effective countermeasures against hardware Trojans by either preventing Trojan attacks or facilitating detection during test. Obfuscation is a technique that is conventionally employed to prevent piracy of software and hardware intellectual property (IP). In this work, we propose a novel application of key-based circuit structure and functionality obfuscation to achieve protection against hardware Trojans triggered by rare internal circuit conditions. The proposed obfuscation scheme is based on judicious modification of the state transition function, which creates two distinct functional modes: normal and obfuscated. A circuit transitions from the obfuscated to the normal mode only upon application of a specific input sequence, which defines the key. We show that it provides security against Trojan attacks in two ways: (1) it makes some inserted Trojans benign, i.e. they become effective only in the obfuscated mode; and (2) it prevents an adversary from exploiting the true rare events in a circuit to insert hard-to-detect Trojans. The proposed design methodology can thus achieve simultaneous protection from hardware Trojans and hardware IP piracy. Besides protecting ICs against Trojan attacks in foundry, we show that it can also protect against malicious modifications by untrusted computer-aided design (CAD) tools in both SoC and FPGA design flows. Simulation results for a set of benchmark circuits show that the scheme is capable of achieving high levels of security against Trojan attacks at modest area, power and delay overhead.
机译:在不受信任的制造设施中对硬件的恶意修改(称为硬件Trojan)已成为主要的安全问题。在生产后测试期间全面检测这些木马非常困难。因此,开发设计技术以通过防止Trojan攻击或促进测试期间的检测来提供针对硬件Trojan的有效对策非常重要。混淆是一种通常用于防止软件和硬件知识产权(IP)盗版的技术。在这项工作中,我们提出了一种基于密钥的电路结构和功能混淆的新颖应用,以实现针对由罕见内部电路条件触发的硬件木马的保护。所提出的混淆方案基于对状态转换函数的明智修改,从而创建了两种不同的功能模式:正常和混淆。仅在应用定义键的特定输入序列时,电路才从模糊模式转换到正常模式。我们展示了它通过两种方式为抵御特洛伊木马攻击提供了安全性:(1)它使某些插入的特洛伊木马成为良性,即它们仅在混淆模式下才有效; (2)防止对手利用电路中的真正罕见事件来插入难以检测的特洛伊木马。因此,所提出的设计方法可以实现对硬件木马和硬件IP盗版的同时保护。我们证明,除了保护IC免受代工厂中的Trojan攻击之外,它还可以通过SoC和FPGA设计流程中不受信任的计算机辅助设计(CAD)工具来防止恶意修改。一组基准电路的仿真结果表明,该方案能够在适度的面积,功耗和延迟开销下实现针对特洛伊木马攻击的高级别安全性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号