Visible to the public A Novel Use of Approximate Circuits to Thwart Hardware Trojan Insertion and Provide Obfuscation

TitleA Novel Use of Approximate Circuits to Thwart Hardware Trojan Insertion and Provide Obfuscation
Publication TypeConference Paper
Year of Publication2018
AuthorsMartin, H., Entrena, L., Dupuis, S., Natale, G. Di
Conference Name2018 IEEE 24th International Symposium on On-Line Testing And Robust System Design (IOLTS)
ISBN Number978-1-5386-5992-2
Keywordsad-hoc design rules, approximate logic circuit, approximation, Circuit faults, critical circuits, error detection, fabricated IC, Hardware, hardware trojan, Hardware Trojans, integrated circuit industry, integrated circuits, invasive software, logic circuits, malicious modifications, novel prevention technique, original circuit, prevention methods, pubcrawl, security of data, Sensitivity, Thwart Hardware Trojan insertion, trojan horse detection, Trojan horses, Tunneling magnetoresistance
Abstract

Hardware Trojans have become in the last decade a major threat in the Integrated Circuit industry. Many techniques have been proposed in the literature aiming at detecting such malicious modifications in fabricated ICs. For the most critical circuits, prevention methods are also of interest. The goal of such methods is to prevent the insertion of a Hardware Trojan thanks to ad-hoc design rules. In this paper, we present a novel prevention technique based on approximation. An approximate logic circuit is a circuit that performs a possibly different but closely related logic function, so that it can be used for error detection or error masking where it overlaps with the original circuit. We will show how this technique can successfully detect the presence of Hardware Trojans, with a solution that has a smaller impact than triplication.

URLhttps://ieeexplore.ieee.org/document/8474077
DOI10.1109/IOLTS.2018.8474077
Citation Keymartin_novel_2018