Abstract | ||
---|---|---|
A Hardware Trojan is a malicious hardware modification of an integrated circuit. It could be inserted at different design steps but also during the process fabrication of the target. Due to the damages that can be caused, detection of these alterations has become a major concern. In this paper, we propose a new resilient method to detect Hardware Trojan based on path delay measurements. First, an accurate path delay model is defined. Then, path delay measurements are compared in a way that theoretically eliminate process and experimental variations effects. Finally, this proposed detection method is experimentally validated using different FPGA boards with substantial process variations. Both small sized sequential and combinatorial Hardware Trojans are implemented and successfully detected. |
Year | DOI | Venue |
---|---|---|
2015 | 10.1109/HST.2015.7140254 | Hardware Oriented Security and Trust |
Keywords | Field | DocType |
field programmable gate arrays,integrated circuits,invasive software,FPGA boards,combinatorial Hardware Trojans,integrated circuit,malicious hardware modification,path delay measurements,resilient hardware Trojans detection,Hardware Trojan,delay model,path delay measurements,process variation | Hardware Trojan,Synchronization,Computer science,Field-programmable gate array,Path delay,Real-time computing,Electronic engineering,Computer hardware,Integrated circuit,Embedded system | Conference |
Citations | PageRank | References |
4 | 0.42 | 10 |
Authors | ||
4 |
Name | Order | Citations | PageRank |
---|---|---|---|
Exurville, I. | 1 | 16 | 1.47 |
Loïc Zussa | 2 | 4 | 0.76 |
Jean-Baptiste Rigaud | 3 | 130 | 15.01 |
Bruno Robisson | 4 | 344 | 22.03 |