Keyed logic BIST for Trojan detection in SoC

Elena Dubrova, Mats Naslund, Gunnar Carlsson, Ben Smeets

Forskningsoutput: Kapitel i bok/rapport/Conference proceedingKonferenspaper i proceedingPeer review

Sammanfattning

As demonstrated by the recent attack on Intel's Ivy Bridge processor, the traditional Logic Built-In Self-Test (LBIST) methods do not provide adequate protection of SoC against malicious modifications known as hardware Trojans. In this paper, we introduce a simple but efficient countermeasure against hardware Trojans which exploits non-zero aliasing probability of LBIST. We propose to generate LBIST test patterns based on a configurable key which is decided and programed into the circuit after the manufacturing stage. Since the key and hence expected LBIST signature are unknown at the manufacturing stage, an attack based on selecting suitable values for the Trojan which result in the same signature as a fault-free circuit signature becomes infeasible.

Originalspråkengelska
Titel på värdpublikation2014 International Symposium on System-on-Chip, SoC 2014
RedaktörerOndrej Daniel, Peeter Ellervee, Dragomir Milojevic, Jari Nurmi, Tommi Paakki
FörlagIEEE - Institute of Electrical and Electronics Engineers Inc.
ISBN (elektroniskt)9781479968909
DOI
StatusPublished - 2014 dec. 2
Externt publiceradJa
Evenemang2014 16th International Symposium on System-on-Chip, SoC 2014 - Tampere, Finland
Varaktighet: 2014 okt. 282014 okt. 29

Publikationsserier

Namn2014 International Symposium on System-on-Chip, SoC 2014

Konferens

Konferens2014 16th International Symposium on System-on-Chip, SoC 2014
Land/TerritoriumFinland
OrtTampere
Period2014/10/282014/10/29

Bibliografisk information

Publisher Copyright:
© 2014 IEEE.

Ämnesklassifikation (UKÄ)

  • Datavetenskap (datalogi)

Fingeravtryck

Utforska forskningsämnen för ”Keyed logic BIST for Trojan detection in SoC”. Tillsammans bildar de ett unikt fingeravtryck.

Citera det här