Hardware Trojan prevention method based on secret key

Zhaoyang SHI,Xuecheng ZOU,Ruihua MING,Zhenglin LIU
DOI: https://doi.org/10.16652/j.issn.1004-373x.2016.20.001
2016-01-01
Abstract:Hardware Trojans draw more and more attention of the academia and industrial community because of its huge potential threat in recent years. Trojans may be inserted in all the current main IC design process. Considering the Trojans insert?ing mechanism,a hardware Trojan prevention method based on secret keys is proposed,which is realized by adding initial se?quence (secret keys),confusing circuit and redundant circuit,and hiding the original circuit with correct function. The result based on a large number of test vectors shows that the optimized prevention circuit can effectively prevent the normal circuit to be attacked by the Trojans in the case of not spending more extra circuit resources.
What problem does this paper attempt to address?