As demonstrated by the recent attack on Intel's Ivy Bridge processor, the traditional Logic Built-In Self-Test (LBIST) methods do not provide adequate protection of SoC against malicious modifications known as hardware Trojans. In this paper, we introduce a simple but efficient countermeasure against hardware Trojans which exploits non-zero aliasing probability of LBIST. We propose to generate LBIST test patterns based on a configurable key which is decided and programed into the circuit after the manufacturing stage. Since the key and hence expected LBIST signature are unknown at the manufacturing stage, an attack based on selecting suitable values for the Trojan which result in the same signature as a fault-free circuit signature becomes infeasible.
|Title of host publication||2014 International Symposium on System-on-Chip, SoC 2014|
|Editors||Ondrej Daniel, Peeter Ellervee, Dragomir Milojevic, Jari Nurmi, Tommi Paakki|
|Publisher||IEEE - Institute of Electrical and Electronics Engineers Inc.|
|Publication status||Published - 2014 Dec 2|
|Event||2014 16th International Symposium on System-on-Chip, SoC 2014 - Tampere, Finland|
Duration: 2014 Oct 28 → 2014 Oct 29
|Name||2014 International Symposium on System-on-Chip, SoC 2014|
|Conference||2014 16th International Symposium on System-on-Chip, SoC 2014|
|Period||2014/10/28 → 2014/10/29|
Bibliographical notePublisher Copyright:
© 2014 IEEE.
Subject classification (UKÄ)
- Computer Science