A Novel Use of Approximate Circuits to Thwart Hardware Trojan Insertion and Provide Obfuscation
Title | A Novel Use of Approximate Circuits to Thwart Hardware Trojan Insertion and Provide Obfuscation |
Publication Type | Conference Paper |
Year of Publication | 2018 |
Authors | Martin, H., Entrena, L., Dupuis, S., Natale, G. Di |
Conference Name | 2018 IEEE 24th International Symposium on On-Line Testing And Robust System Design (IOLTS) |
ISBN Number | 978-1-5386-5992-2 |
Keywords | ad-hoc design rules, approximate logic circuit, approximation, Circuit faults, critical circuits, error detection, fabricated IC, Hardware, hardware trojan, Hardware Trojans, integrated circuit industry, integrated circuits, invasive software, logic circuits, malicious modifications, novel prevention technique, original circuit, prevention methods, pubcrawl, security of data, Sensitivity, Thwart Hardware Trojan insertion, trojan horse detection, Trojan horses, Tunneling magnetoresistance |
Abstract | Hardware Trojans have become in the last decade a major threat in the Integrated Circuit industry. Many techniques have been proposed in the literature aiming at detecting such malicious modifications in fabricated ICs. For the most critical circuits, prevention methods are also of interest. The goal of such methods is to prevent the insertion of a Hardware Trojan thanks to ad-hoc design rules. In this paper, we present a novel prevention technique based on approximation. An approximate logic circuit is a circuit that performs a possibly different but closely related logic function, so that it can be used for error detection or error masking where it overlaps with the original circuit. We will show how this technique can successfully detect the presence of Hardware Trojans, with a solution that has a smaller impact than triplication. |
URL | https://ieeexplore.ieee.org/document/8474077 |
DOI | 10.1109/IOLTS.2018.8474077 |
Citation Key | martin_novel_2018 |
- invasive software
- Tunneling magnetoresistance
- Trojan horses
- trojan horse detection
- Thwart Hardware Trojan insertion
- Sensitivity
- security of data
- pubcrawl
- prevention methods
- original circuit
- novel prevention technique
- malicious modifications
- logic circuits
- ad-hoc design rules
- integrated circuits
- integrated circuit industry
- Hardware Trojans
- hardware trojan
- Hardware
- fabricated IC
- error detection
- critical circuits
- Circuit faults
- approximation
- approximate logic circuit