On-demand transparency for improving hardware Trojan detectability

  • Authors:
  • Rajat Subhra Chakraborty;Somnath Paul;Swarup Bhunia

  • Affiliations:
  • Department of Electrical Engineering and Computer Science, Case Western Reserve University, Cleveland, OH, USA;Department of Electrical Engineering and Computer Science, Case Western Reserve University, Cleveland, OH, USA;Department of Electrical Engineering and Computer Science, Case Western Reserve University, Cleveland, OH, USA

  • Venue:
  • HST '08 Proceedings of the 2008 IEEE International Workshop on Hardware-Oriented Security and Trust
  • Year:
  • 2008

Quantified Score

Hi-index 0.00

Visualization

Abstract

Malevolent Trojan circuits inserted by layout modifications in an IC at untrustworthy fabrication facilities are difficult to detect by traditional post-manufacturing testing. In this paper, we develop a novel low-overhead design methodology that facilitates the detection of inserted Trojan hardware in an IC through logic testing. As a byproduct, it also increases the security of the design by design obfuscation. Application of the proposed design methodology to an 8-bit RISC processor and a JPEG encoder resulted in improvement in Trojan detection probability significantly. It also obfuscated the design with verification mismatch for 90% of the verification points, while incurring moderate area, power and delay overheads.