X. Ngo, S. Guilley, S. Bhasin, J. Danger, Zakaria Najm
{"title":"Encoding the state of integrated circuits: a proactive and reactive protection against hardware Trojans horses","authors":"X. Ngo, S. Guilley, S. Bhasin, J. Danger, Zakaria Najm","doi":"10.1145/2668322.2668329","DOIUrl":null,"url":null,"abstract":"Hardware Trojan Horses (HTH) are a serious threat to semiconductor industry with significant economic impact. However, most of the research in HTH focuses on detection. We propose the concept of \"encoded circuit\", as a technique to protect HTH insertion. Encoded circuit is based on the theory of codes. It encodes the internal state with a chosen code of security parameter d, such that knowledge of less than d bits of the encoded state reveals no information about the actual state. This parameter stems from a similar notion introduced by Ishai, Sahai and Wagner at CRYPTO 2003 for the prevention of probing attacks. Usually d < 10 in probing attacks, whereas HTH are able to connect to more than 10 nets. In this paper, we discuss the theory behind \"encoded circuits\" and its practical demonstration on various HDL circuits.","PeriodicalId":434126,"journal":{"name":"WESS '14","volume":"24 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"16","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"WESS '14","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/2668322.2668329","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 16
Abstract
Hardware Trojan Horses (HTH) are a serious threat to semiconductor industry with significant economic impact. However, most of the research in HTH focuses on detection. We propose the concept of "encoded circuit", as a technique to protect HTH insertion. Encoded circuit is based on the theory of codes. It encodes the internal state with a chosen code of security parameter d, such that knowledge of less than d bits of the encoded state reveals no information about the actual state. This parameter stems from a similar notion introduced by Ishai, Sahai and Wagner at CRYPTO 2003 for the prevention of probing attacks. Usually d < 10 in probing attacks, whereas HTH are able to connect to more than 10 nets. In this paper, we discuss the theory behind "encoded circuits" and its practical demonstration on various HDL circuits.