Security against hardware Trojan through a novel application of design obfuscation
Malicious hardware Trojan circuitry inserted in safety-critical applications is a major threat to national security. In this work, we propose a novel application of a key-based obfuscation technique to achieve security against hardware Trojans. The obfuscation scheme is based on modifying the state...
Saved in:
| Published in: | 2009 IEEE/ACM International Conference on Computer-Aided Design - Digest of Technical Papers pp. 113 - 116 |
|---|---|
| Main Authors: | , |
| Format: | Conference Proceeding |
| Language: | English |
| Published: |
IEEE
02.11.2009
|
| Subjects: | |
| ISSN: | 1092-3152 |
| Online Access: | Get full text |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Abstract | Malicious hardware Trojan circuitry inserted in safety-critical applications is a major threat to national security. In this work, we propose a novel application of a key-based obfuscation technique to achieve security against hardware Trojans. The obfuscation scheme is based on modifying the state transition function of a given circuit by expanding its reachable state space and enabling it to operate in two distinct modes - the normal mode and the obfuscated mode. Such a modification obfuscates the rareness of the internal circuit nodes, thus making it difficult for an adversary to insert hard-to-detect Trojans. It also makes some inserted Trojans benign by making them activate only in the obfuscated mode. The combined effect leads to higher Trojan detectability and higher level of protection against such attack. Simulation results for a set of benchmark circuits show that the scheme is capable of achieving high levels of security at modest design overhead. |
|---|---|
| AbstractList | Malicious hardware Trojan circuitry inserted in safety-critical applications is a major threat to national security. In this work, we propose a novel application of a key-based obfuscation technique to achieve security against hardware Trojans. The obfuscation scheme is based on modifying the state transition function of a given circuit by expanding its reachable state space and enabling it to operate in two distinct modes - the normal mode and the obfuscated mode. Such a modification obfuscates the rareness of the internal circuit nodes, thus making it difficult for an adversary to insert hard-to-detect Trojans. It also makes some inserted Trojans benign by making them activate only in the obfuscated mode. The combined effect leads to higher Trojan detectability and higher level of protection against such attack. Simulation results for a set of benchmark circuits show that the scheme is capable of achieving high levels of security at modest design overhead. |
| Author | Bhunia, S. Chakraborty, R.S. |
| Author_xml | – sequence: 1 givenname: R.S. surname: Chakraborty fullname: Chakraborty, R.S. organization: Dept. of Electr. Eng. & Comp. Sci., Case Western Reserve Univ., Cleveland, OH, USA – sequence: 2 givenname: S. surname: Bhunia fullname: Bhunia, S. organization: Dept. of Electr. Eng. & Comp. Sci., Case Western Reserve Univ., Cleveland, OH, USA |
| BookMark | eNotjEtLAzEURiNUsK1du3CTPzA1N5m8llJ8QUHQ7stN52Ympc6UzIzSf2-lns05fItvxiZt1xJjdyCWAKV-AOOs8n7551KWV2wGRmjtnBBuwqYgvCwUaHnDFn2_F2eMcd6WU_bxSbsxp-HEscbU9gNvMFc_mIlvcrfHlg9N7sa64cjb7psOHI_HQ9rhkLqWd5FX1Kf6XCGO_WW9ZdcRDz0t_j1nm-enzeq1WL-_vK0e1wVK6YYiglYBvPRUBaecNzEE4WIkcEEZb1yEnQqKpIUSLVpH0lTKVrHSwRur5uz-cpuIaHvM6QvzaauVASWM-gWPaFG0 |
| ContentType | Conference Proceeding |
| DBID | 6IE 6IH CBEJK RIE RIO |
| DOI | 10.1145/1687399.1687424 |
| DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Proceedings Order Plan (POP) 1998-present by volume IEEE Xplore All Conference Proceedings IEEE/IET Electronic Library (IEL) (UW System Shared) IEEE Proceedings Order Plans (POP) 1998-present |
| DatabaseTitleList | |
| Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://ieeexplore.ieee.org/ sourceTypes: Publisher |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering |
| EISBN | 1605588008 9781605588001 |
| EndPage | 116 |
| ExternalDocumentID | 5361306 |
| Genre | orig-research |
| GroupedDBID | 123 6IE 6IF 6IH 6IL 6IN AAWTH ABLEC ADZIZ ALMA_UNASSIGNED_HOLDINGS APO BEFXN BFFAM BGNUA BKEBE BPEOZ CBEJK CHZPO FEDTE IEGSK IJVOP M43 OCL RIE RIL RIO |
| ID | FETCH-LOGICAL-a228t-f153b1929edb83896fbb08ffe18b36968f1c3b3e2714a7a78e26d37dfd5b9673 |
| IEDL.DBID | RIE |
| ISSN | 1092-3152 |
| IngestDate | Wed Aug 27 02:45:26 EDT 2025 |
| IsPeerReviewed | false |
| IsScholarly | false |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-a228t-f153b1929edb83896fbb08ffe18b36968f1c3b3e2714a7a78e26d37dfd5b9673 |
| PageCount | 4 |
| ParticipantIDs | ieee_primary_5361306 |
| PublicationCentury | 2000 |
| PublicationDate | 2009-11-02 |
| PublicationDateYYYYMMDD | 2009-11-02 |
| PublicationDate_xml | – month: 11 year: 2009 text: 2009-11-02 day: 02 |
| PublicationDecade | 2000 |
| PublicationTitle | 2009 IEEE/ACM International Conference on Computer-Aided Design - Digest of Technical Papers |
| PublicationTitleAbbrev | ICCAD |
| PublicationYear | 2009 |
| Publisher | IEEE |
| Publisher_xml | – name: IEEE |
| SSID | ssj0000668974 ssj0020286 |
| Score | 1.7982337 |
| Snippet | Malicious hardware Trojan circuitry inserted in safety-critical applications is a major threat to national security. In this work, we propose a novel... |
| SourceID | ieee |
| SourceType | Publisher |
| StartPage | 113 |
| SubjectTerms | Circuit simulation Circuit testing Computational modeling Design obfuscation Hardware hardware security hardware Trojan Information security Logic design National security Permission Protection State-space methods |
| Title | Security against hardware Trojan through a novel application of design obfuscation |
| URI | https://ieeexplore.ieee.org/document/5361306 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV09T8MwED21FQMsfLSIb3lgJG3i-CszomKqKujQrbLjMwKhBKVp-_ex01A6sDDZ8mTZkt-7O797APc619JyilHQgETMcBMZbkWkUToRO8mMcI3ZhJxM1HyeTTvwsNPCIGLz-QyHYdrU8m2Zr0KqbMTTwHZFF7pSiq1Wa5dP8dCpskBl2mDL42ajLIqz0JSP07atT8L4KBFKelwehpEFqfuer0oDK-Pj_23oBAa_-jwy3SHPKXSwOIOjvdaCfXh5bY3piH7zwf-yJkFetdEVkllVfuiCtA49RJOiXOMn2Stlk9IR23ztIKVxq-V2dQCz8dPs8Tlq_RMiTamqI-dfM-MZXIbWKE9MhDMmVs5hokyw8VMuyVOTIpUJ01JLhVTYVFpnucmETM-hV5QFXgBJuPFhG-cmVcgs00qnQqtAVYJ5D9WX0A-Hs_jadshYtOdy9ffyNRz-1GRiegO9ulrhLRzk6_p9Wd011_oNzu-hVg |
| linkProvider | IEEE |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV09T8MwED2VggQsfLSIbzwwkjZx_JUZURVRqgoydKvs2EYglKA0LX8fO41KBxYmW54sW_J7d-d3D-BWZpJrik3gNSABUVQFimoWSMMtCy0nitnabIKPx2I6TSYtuFtrYYwx9ecz0_PTupavi2zhU2V9Gnu2y7ZgmxKCw5Vaa51RceApEk9mmnDLIWetLQoT35aP4qaxT0RoP2KCO2Tu-ZF4sfuGs0oNLIOD_23pELq_Cj00WWPPEbRMfgz7G80FO_Dy2ljTIfnmwv95hbzA6luWBqVl8SFz1Hj0IInyYmk-0UYxGxUW6fpzByqUXcxXq11IBw_p_TBoHBQCibGoAuveM-U4XGK0Eo6aMKtUKKw1kVDeyE_YKItVbDCPiOSSC4OZjrm2mqqE8fgE2nmRm1NAEVUucKNUxcIQTaSQMZPCkxVv34PlGXT84cy-Vj0yZs25nP-9fAO7w_R5NBs9jp8uYK-u0PhULb6EdlUuzBXsZMvqfV5e11f8A2WCpJs |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=proceeding&rft.title=2009+IEEE%2FACM+International+Conference+on+Computer-Aided+Design+-+Digest+of+Technical+Papers&rft.atitle=Security+against+hardware+Trojan+through+a+novel+application+of+design+obfuscation&rft.au=Chakraborty%2C+R.S.&rft.au=Bhunia%2C+S.&rft.date=2009-11-02&rft.pub=IEEE&rft.issn=1092-3152&rft.spage=113&rft.epage=116&rft_id=info:doi/10.1145%2F1687399.1687424&rft.externalDocID=5361306 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1092-3152&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1092-3152&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1092-3152&client=summon |