Security against hardware Trojan through a novel application of design obfuscation

Malicious hardware Trojan circuitry inserted in safety-critical applications is a major threat to national security. In this work, we propose a novel application of a key-based obfuscation technique to achieve security against hardware Trojans. The obfuscation scheme is based on modifying the state...

Full description

Saved in:
Bibliographic Details
Published in:2009 IEEE/ACM International Conference on Computer-Aided Design - Digest of Technical Papers pp. 113 - 116
Main Authors: Chakraborty, R.S., Bhunia, S.
Format: Conference Proceeding
Language:English
Published: IEEE 02.11.2009
Subjects:
ISSN:1092-3152
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Abstract Malicious hardware Trojan circuitry inserted in safety-critical applications is a major threat to national security. In this work, we propose a novel application of a key-based obfuscation technique to achieve security against hardware Trojans. The obfuscation scheme is based on modifying the state transition function of a given circuit by expanding its reachable state space and enabling it to operate in two distinct modes - the normal mode and the obfuscated mode. Such a modification obfuscates the rareness of the internal circuit nodes, thus making it difficult for an adversary to insert hard-to-detect Trojans. It also makes some inserted Trojans benign by making them activate only in the obfuscated mode. The combined effect leads to higher Trojan detectability and higher level of protection against such attack. Simulation results for a set of benchmark circuits show that the scheme is capable of achieving high levels of security at modest design overhead.
AbstractList Malicious hardware Trojan circuitry inserted in safety-critical applications is a major threat to national security. In this work, we propose a novel application of a key-based obfuscation technique to achieve security against hardware Trojans. The obfuscation scheme is based on modifying the state transition function of a given circuit by expanding its reachable state space and enabling it to operate in two distinct modes - the normal mode and the obfuscated mode. Such a modification obfuscates the rareness of the internal circuit nodes, thus making it difficult for an adversary to insert hard-to-detect Trojans. It also makes some inserted Trojans benign by making them activate only in the obfuscated mode. The combined effect leads to higher Trojan detectability and higher level of protection against such attack. Simulation results for a set of benchmark circuits show that the scheme is capable of achieving high levels of security at modest design overhead.
Author Bhunia, S.
Chakraborty, R.S.
Author_xml – sequence: 1
  givenname: R.S.
  surname: Chakraborty
  fullname: Chakraborty, R.S.
  organization: Dept. of Electr. Eng. & Comp. Sci., Case Western Reserve Univ., Cleveland, OH, USA
– sequence: 2
  givenname: S.
  surname: Bhunia
  fullname: Bhunia, S.
  organization: Dept. of Electr. Eng. & Comp. Sci., Case Western Reserve Univ., Cleveland, OH, USA
BookMark eNotjEtLAzEURiNUsK1du3CTPzA1N5m8llJ8QUHQ7stN52Ympc6UzIzSf2-lns05fItvxiZt1xJjdyCWAKV-AOOs8n7551KWV2wGRmjtnBBuwqYgvCwUaHnDFn2_F2eMcd6WU_bxSbsxp-HEscbU9gNvMFc_mIlvcrfHlg9N7sa64cjb7psOHI_HQ9rhkLqWd5FX1Kf6XCGO_WW9ZdcRDz0t_j1nm-enzeq1WL-_vK0e1wVK6YYiglYBvPRUBaecNzEE4WIkcEEZb1yEnQqKpIUSLVpH0lTKVrHSwRur5uz-cpuIaHvM6QvzaauVASWM-gWPaFG0
ContentType Conference Proceeding
DBID 6IE
6IH
CBEJK
RIE
RIO
DOI 10.1145/1687399.1687424
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Proceedings Order Plan (POP) 1998-present by volume
IEEE Xplore All Conference Proceedings
IEEE/IET Electronic Library (IEL) (UW System Shared)
IEEE Proceedings Order Plans (POP) 1998-present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISBN 1605588008
9781605588001
EndPage 116
ExternalDocumentID 5361306
Genre orig-research
GroupedDBID 123
6IE
6IF
6IH
6IL
6IN
AAWTH
ABLEC
ADZIZ
ALMA_UNASSIGNED_HOLDINGS
APO
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CBEJK
CHZPO
FEDTE
IEGSK
IJVOP
M43
OCL
RIE
RIL
RIO
ID FETCH-LOGICAL-a228t-f153b1929edb83896fbb08ffe18b36968f1c3b3e2714a7a78e26d37dfd5b9673
IEDL.DBID RIE
ISSN 1092-3152
IngestDate Wed Aug 27 02:45:26 EDT 2025
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-a228t-f153b1929edb83896fbb08ffe18b36968f1c3b3e2714a7a78e26d37dfd5b9673
PageCount 4
ParticipantIDs ieee_primary_5361306
PublicationCentury 2000
PublicationDate 2009-11-02
PublicationDateYYYYMMDD 2009-11-02
PublicationDate_xml – month: 11
  year: 2009
  text: 2009-11-02
  day: 02
PublicationDecade 2000
PublicationTitle 2009 IEEE/ACM International Conference on Computer-Aided Design - Digest of Technical Papers
PublicationTitleAbbrev ICCAD
PublicationYear 2009
Publisher IEEE
Publisher_xml – name: IEEE
SSID ssj0000668974
ssj0020286
Score 1.7982337
Snippet Malicious hardware Trojan circuitry inserted in safety-critical applications is a major threat to national security. In this work, we propose a novel...
SourceID ieee
SourceType Publisher
StartPage 113
SubjectTerms Circuit simulation
Circuit testing
Computational modeling
Design obfuscation
Hardware
hardware security
hardware Trojan
Information security
Logic design
National security
Permission
Protection
State-space methods
Title Security against hardware Trojan through a novel application of design obfuscation
URI https://ieeexplore.ieee.org/document/5361306
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV09T8MwED21FQMsfLSIb3lgJG3i-CszomKqKujQrbLjMwKhBKVp-_ex01A6sDDZ8mTZkt-7O797APc619JyilHQgETMcBMZbkWkUToRO8mMcI3ZhJxM1HyeTTvwsNPCIGLz-QyHYdrU8m2Zr0KqbMTTwHZFF7pSiq1Wa5dP8dCpskBl2mDL42ajLIqz0JSP07atT8L4KBFKelwehpEFqfuer0oDK-Pj_23oBAa_-jwy3SHPKXSwOIOjvdaCfXh5bY3piH7zwf-yJkFetdEVkllVfuiCtA49RJOiXOMn2Stlk9IR23ztIKVxq-V2dQCz8dPs8Tlq_RMiTamqI-dfM-MZXIbWKE9MhDMmVs5hokyw8VMuyVOTIpUJ01JLhVTYVFpnucmETM-hV5QFXgBJuPFhG-cmVcgs00qnQqtAVYJ5D9WX0A-Hs_jadshYtOdy9ffyNRz-1GRiegO9ulrhLRzk6_p9Wd011_oNzu-hVg
linkProvider IEEE
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV09T8MwED2VggQsfLSIbzwwkjZx_JUZURVRqgoydKvs2EYglKA0LX8fO41KBxYmW54sW_J7d-d3D-BWZpJrik3gNSABUVQFimoWSMMtCy0nitnabIKPx2I6TSYtuFtrYYwx9ecz0_PTupavi2zhU2V9Gnu2y7ZgmxKCw5Vaa51RceApEk9mmnDLIWetLQoT35aP4qaxT0RoP2KCO2Tu-ZF4sfuGs0oNLIOD_23pELq_Cj00WWPPEbRMfgz7G80FO_Dy2ljTIfnmwv95hbzA6luWBqVl8SFz1Hj0IInyYmk-0UYxGxUW6fpzByqUXcxXq11IBw_p_TBoHBQCibGoAuveM-U4XGK0Eo6aMKtUKKw1kVDeyE_YKItVbDCPiOSSC4OZjrm2mqqE8fgE2nmRm1NAEVUucKNUxcIQTaSQMZPCkxVv34PlGXT84cy-Vj0yZs25nP-9fAO7w_R5NBs9jp8uYK-u0PhULb6EdlUuzBXsZMvqfV5e11f8A2WCpJs
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=proceeding&rft.title=2009+IEEE%2FACM+International+Conference+on+Computer-Aided+Design+-+Digest+of+Technical+Papers&rft.atitle=Security+against+hardware+Trojan+through+a+novel+application+of+design+obfuscation&rft.au=Chakraborty%2C+R.S.&rft.au=Bhunia%2C+S.&rft.date=2009-11-02&rft.pub=IEEE&rft.issn=1092-3152&rft.spage=113&rft.epage=116&rft_id=info:doi/10.1145%2F1687399.1687424&rft.externalDocID=5361306
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1092-3152&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1092-3152&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1092-3152&client=summon