Loading...

Improving hardware Trojan detection using scan chain based ring oscillators

Asadi Kouhanjani, M. R ; Sharif University of Technology | 2018

856 Viewed
  1. Type of Document: Article
  2. DOI: 10.1016/j.micpro.2018.08.008
  3. Publisher: Elsevier B.V , 2018
  4. Abstract:
  5. In recent years, the security of integrated circuits (ICs) has received more attention as usage of ICs made by untrustworthy foundries has increased in safety-critical systems [1]. In this paper, we introduce a novel approach for fingerprinting the delay of functional paths in a sequential circuit that have millions of transistors, like processors. We present a method for inserting Ring Oscillators (ROs) into scan chain for measuring the delay of each functional path inside the chip. Using the proposed method, the payload part of Trojans will be detected according to their size and cell types. Our method can be used by power-based Trojan detection approaches for finding the trigger part of Trojans. We also introduce an algorithm for quantifying the vulnerability of the nets. We show that a designer can achieve a good trade-off between area overhead reduction and security enhancement while evaluating the vulnerability degree of each net. © 2018 Elsevier B.V
  6. Keywords:
  7. Hardware Trojans ; Process variation ; Ring oscillator ; Chains ; Delay circuits ; Design for testability ; Economic and social effects ; Hardware ; Hardware security ; Integrated circuits ; Oscillators (electronic) ; Safety engineering ; Hardware Trojan detection ; Inherent vulnerabilities ; Integrated circuits (ICs) ; Safety critical systems ; Security enhancements ; Vulnerability degree ; Malware
  8. Source: Microprocessors and Microsystems ; Volume 63 , 2018 , Pages 55-65 ; 01419331 (ISSN)
  9. URL: https://www.sciencedirect.com/science/article/abs/pii/S0141933117301345