Abstract
This paper proposes a redesign technique which designs from untrusted netlists to trusted netlists. Our approach consists of two phases, detection phase and invalidation phase. The detection phase picks up suspicious hardware Trojans (HTs) by pattern matching. The invalidation phase modifies the suspicious HTs in order not to activate them. In the invalidation phase, three invalidation techniques are selected by analyzing location of suspicious malicious nets. Applying appropriately the invalidation technique to the nets can correctly invalidate HTs. In our results, the proposed technique can successfully invalidate HTs on several Trust-HUB benchmarks without HT activations. The results clearly demonstrate that our redesign technique is very effective to remove HT risks.
Original language | English |
---|---|
Title of host publication | 2016 IEEE 22nd International Symposium on On-Line Testing and Robust System Design, IOLTS 2016 |
Publisher | Institute of Electrical and Electronics Engineers Inc. |
Pages | 219-220 |
Number of pages | 2 |
ISBN (Electronic) | 9781509015061 |
DOIs | |
Publication status | Published - 2016 Oct 20 |
Event | 22nd IEEE International Symposium on On-Line Testing and Robust System Design, IOLTS 2016 - Sant Feliu de Guixols, Catalunya, Spain Duration: 2016 Jul 4 → 2016 Jul 6 |
Other
Other | 22nd IEEE International Symposium on On-Line Testing and Robust System Design, IOLTS 2016 |
---|---|
Country/Territory | Spain |
City | Sant Feliu de Guixols, Catalunya |
Period | 16/7/4 → 16/7/6 |
Keywords
- design for security
- gate-level netlist
- hardware security
- hardware Trojans
- redesign
ASJC Scopus subject areas
- Hardware and Architecture
- Safety, Risk, Reliability and Quality
- Computer Networks and Communications