Real-Time Protection Architecture Against Hardware Trojan Attacks

Xue Mingfu,Hu Aiqun,Wang Youdong
DOI: https://doi.org/10.1109/mines.2013.208
2013-01-01
Abstract:Integrated Circuits are becoming increasing vulnerable to hardware Trojans (HT). Conventional structural and functional tests fall short to detect HT due to Trojans' stealthy nature and large number of instances the adversary can exploit. Existing research efforts for HT detection are mostly focusing on pre-deployment detection techniques, although effective and necessary, there are still Trojans survived during the pre-deployment validations. We have to ask a question: if a post-deployment digital system already consists of untrusted (Trojan-inserted) components, to what extent can we provide runtime protection of the system, and how? This paper presents a systematic hardware security design (SHSD) methodology against HT attacks, which provides real-time protection of ICs during post-deployment normal operations. The proposed design-for-security architecture provides a last line of defense against HT attacks, thus can also be used as a complement to pre-deployment detection methods. Flexibility for customization and overhead issue of the proposed SHSD are described. Additionally, common attacks with corresponding countermeasures provided by the SHSD are presented. The design modification introduced by the proposed SHSD also helps to obfuscate the design which makes Trojan insertion difficult for an adversary. Hardware implementation validations on FPGA platforms show the effectives and low overhead of the proposed scheme.
What problem does this paper attempt to address?