Security against hardware Trojan through a novel application of design obfuscation

Malicious hardware Trojan circuitry inserted in safety-critical applications is a major threat to national security. In this work, we propose a novel application of a key-based obfuscation technique to achieve security against hardware Trojans. The obfuscation scheme is based on modifying the state...

Celý popis

Uloženo v:
Podrobná bibliografie
Vydáno v:2009 IEEE/ACM International Conference on Computer-Aided Design - Digest of Technical Papers s. 113 - 116
Hlavní autoři: Chakraborty, R.S., Bhunia, S.
Médium: Konferenční příspěvek
Jazyk:angličtina
Vydáno: IEEE 02.11.2009
Témata:
ISSN:1092-3152
On-line přístup:Získat plný text
Tagy: Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
Abstract Malicious hardware Trojan circuitry inserted in safety-critical applications is a major threat to national security. In this work, we propose a novel application of a key-based obfuscation technique to achieve security against hardware Trojans. The obfuscation scheme is based on modifying the state transition function of a given circuit by expanding its reachable state space and enabling it to operate in two distinct modes - the normal mode and the obfuscated mode. Such a modification obfuscates the rareness of the internal circuit nodes, thus making it difficult for an adversary to insert hard-to-detect Trojans. It also makes some inserted Trojans benign by making them activate only in the obfuscated mode. The combined effect leads to higher Trojan detectability and higher level of protection against such attack. Simulation results for a set of benchmark circuits show that the scheme is capable of achieving high levels of security at modest design overhead.
AbstractList Malicious hardware Trojan circuitry inserted in safety-critical applications is a major threat to national security. In this work, we propose a novel application of a key-based obfuscation technique to achieve security against hardware Trojans. The obfuscation scheme is based on modifying the state transition function of a given circuit by expanding its reachable state space and enabling it to operate in two distinct modes - the normal mode and the obfuscated mode. Such a modification obfuscates the rareness of the internal circuit nodes, thus making it difficult for an adversary to insert hard-to-detect Trojans. It also makes some inserted Trojans benign by making them activate only in the obfuscated mode. The combined effect leads to higher Trojan detectability and higher level of protection against such attack. Simulation results for a set of benchmark circuits show that the scheme is capable of achieving high levels of security at modest design overhead.
Author Bhunia, S.
Chakraborty, R.S.
Author_xml – sequence: 1
  givenname: R.S.
  surname: Chakraborty
  fullname: Chakraborty, R.S.
  organization: Dept. of Electr. Eng. & Comp. Sci., Case Western Reserve Univ., Cleveland, OH, USA
– sequence: 2
  givenname: S.
  surname: Bhunia
  fullname: Bhunia, S.
  organization: Dept. of Electr. Eng. & Comp. Sci., Case Western Reserve Univ., Cleveland, OH, USA
BookMark eNotjEtLAzEURiNUsK1du3CTPzA1N5m8llJ8QUHQ7stN52Ympc6UzIzSf2-lns05fItvxiZt1xJjdyCWAKV-AOOs8n7551KWV2wGRmjtnBBuwqYgvCwUaHnDFn2_F2eMcd6WU_bxSbsxp-HEscbU9gNvMFc_mIlvcrfHlg9N7sa64cjb7psOHI_HQ9rhkLqWd5FX1Kf6XCGO_WW9ZdcRDz0t_j1nm-enzeq1WL-_vK0e1wVK6YYiglYBvPRUBaecNzEE4WIkcEEZb1yEnQqKpIUSLVpH0lTKVrHSwRur5uz-cpuIaHvM6QvzaauVASWM-gWPaFG0
ContentType Conference Proceeding
DBID 6IE
6IH
CBEJK
RIE
RIO
DOI 10.1145/1687399.1687424
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Proceedings Order Plan (POP) 1998-present by volume
IEEE Xplore All Conference Proceedings
IEEE Electronic Library (IEL)
IEEE Proceedings Order Plans (POP) 1998-present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISBN 1605588008
9781605588001
EndPage 116
ExternalDocumentID 5361306
Genre orig-research
GroupedDBID 123
6IE
6IF
6IH
6IL
6IN
AAWTH
ABLEC
ADZIZ
ALMA_UNASSIGNED_HOLDINGS
APO
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CBEJK
CHZPO
FEDTE
IEGSK
IJVOP
M43
OCL
RIE
RIL
RIO
ID FETCH-LOGICAL-a228t-f153b1929edb83896fbb08ffe18b36968f1c3b3e2714a7a78e26d37dfd5b9673
IEDL.DBID RIE
ISSN 1092-3152
IngestDate Wed Aug 27 02:45:26 EDT 2025
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-a228t-f153b1929edb83896fbb08ffe18b36968f1c3b3e2714a7a78e26d37dfd5b9673
PageCount 4
ParticipantIDs ieee_primary_5361306
PublicationCentury 2000
PublicationDate 2009-11-02
PublicationDateYYYYMMDD 2009-11-02
PublicationDate_xml – month: 11
  year: 2009
  text: 2009-11-02
  day: 02
PublicationDecade 2000
PublicationTitle 2009 IEEE/ACM International Conference on Computer-Aided Design - Digest of Technical Papers
PublicationTitleAbbrev ICCAD
PublicationYear 2009
Publisher IEEE
Publisher_xml – name: IEEE
SSID ssj0000668974
ssj0020286
Score 1.7983328
Snippet Malicious hardware Trojan circuitry inserted in safety-critical applications is a major threat to national security. In this work, we propose a novel...
SourceID ieee
SourceType Publisher
StartPage 113
SubjectTerms Circuit simulation
Circuit testing
Computational modeling
Design obfuscation
Hardware
hardware security
hardware Trojan
Information security
Logic design
National security
Permission
Protection
State-space methods
Title Security against hardware Trojan through a novel application of design obfuscation
URI https://ieeexplore.ieee.org/document/5361306
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV25TgMxELWSiAIajgRxywUlm6yP9VEjIqooghTpIs_aRiC0i5JN-H1sZxVS0FDZcmXZkt-bGb95CN17R1isD2XMgs449STT4HimSoDwGgaODTaZTcjJRM3netpBDzstjHMufT5zwzhNtXxbl-uYKhsVLLJd0UVdKcVWq7XLpwToVDpSmTbYCriZlEW5jk35Ctq29SG8GBGhZMDlYRx5lLrv-aokWBkf_29DJ2jwq8_D0x3ynKKOq87Q0V5rwT56eW2N6bB5C8H_qsFRXvVtlg7PlvWHqXDr0IMNruqN-8R7pWxce2zT1w5cg1-vtqsDNBs_zR6fs9Y_ITOUqibz4TWDwOC0s6ACMREeIFc-XI-CaOOnPCkZMEcl4UYaqRwVlknrbQFaSHaOelVduQuEiZXGsDIHIizXnIPIvTQQfRS5pCVcon48nMXXtkPGoj2Xq7-Xr9FhqsnE5Cy9Qb1muXa36KDcNO-r5V261h_1xaGP
linkProvider IEEE
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV09T8MwELVKQQIWPlrENx4YSRs7TuzMiKqIUlWQoVvli20EQglK0_L3sd2odGBhsuXJsiW_d3d-9xC6NZpErj4URArSgFFDghQ0C0QOYF9Dy7FBebMJPh6L6TSdtNDdWgujtfafz3TPTX0tX5X5wqXK-nHk2G6yhbZjxmi4UmutMyoWPEXqyEwTblnk9NqiMHVt-WLaNPYhLO6TRHCLzD03Mid233BW8cAyOPjflg5R91ehhydr7DlCLV0co_2N5oId9PLaWNNh-WbD_3mNncDqW1YaZ1X5IQvcePRgiYtyqT_xRjEblwYr_7kDl2AW89VqF2WDh-x-GDQOCoGkVNSBse8ZWA6XagXCUpPEAITC2AsS4Iz8hCF5BJGmnDDJJReaJiriyqgY0oRHJ6hdlIU-RZgoLmWUh0ASxVLGIAkNl-CcFBmnOZyhjjuc2deqR8asOZfzv5dv0O4wex7NRo_jpwu05ys0LlVLL1G7rhb6Cu3ky_p9Xl37K_4Bjkmk1g
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=proceeding&rft.title=2009+IEEE%2FACM+International+Conference+on+Computer-Aided+Design+-+Digest+of+Technical+Papers&rft.atitle=Security+against+hardware+Trojan+through+a+novel+application+of+design+obfuscation&rft.au=Chakraborty%2C+R.S.&rft.au=Bhunia%2C+S.&rft.date=2009-11-02&rft.pub=IEEE&rft.issn=1092-3152&rft.spage=113&rft.epage=116&rft_id=info:doi/10.1145%2F1687399.1687424&rft.externalDocID=5361306
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1092-3152&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1092-3152&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1092-3152&client=summon