Loading...
Search for:
ahari--a
0.015 seconds
FPGA-based protection scheme against hardware trojan horse insertion using dummy logic
, Article IEEE Embedded Systems Letters ; Volume 7, Issue 2 , 2015 , Pages 46-50 ; 19430663 (ISSN) ; Ahari, A ; Asadi, H ; Bayat-Sarmadi, S ; Sharif University of Technology
Institute of Electrical and Electronics Engineers Inc
2015
Abstract
Hardware trojan horses (HTH) have recently emerged as a major security threat for field-programmable gate arrays (FPGAs). Previous studies to protect FPGAs against HTHs may still leave a considerable amount of logic resources to be misused by malicious attacks. This letter presents a low-level HTH protection scheme for FPGAs by filling the unused resources with the proposed dummy logic. In the proposed scheme, we identify the unused resources at the device layout-level and offer dummy logic cells for different resources. The proposed HTH protection scheme has been applied on Xilinx Virtex devices implementing a set of IWLS benchmarks. The results show that by employing the proposed HTH...