Encoding the state of integrated circuits: a proactive and reactive protection against hardware Trojans horses

WESS '14 Pub Date : 2014-10-12 DOI:10.1145/2668322.2668329
X. Ngo, S. Guilley, S. Bhasin, J. Danger, Zakaria Najm
{"title":"Encoding the state of integrated circuits: a proactive and reactive protection against hardware Trojans horses","authors":"X. Ngo, S. Guilley, S. Bhasin, J. Danger, Zakaria Najm","doi":"10.1145/2668322.2668329","DOIUrl":null,"url":null,"abstract":"Hardware Trojan Horses (HTH) are a serious threat to semiconductor industry with significant economic impact. However, most of the research in HTH focuses on detection. We propose the concept of \"encoded circuit\", as a technique to protect HTH insertion. Encoded circuit is based on the theory of codes. It encodes the internal state with a chosen code of security parameter d, such that knowledge of less than d bits of the encoded state reveals no information about the actual state. This parameter stems from a similar notion introduced by Ishai, Sahai and Wagner at CRYPTO 2003 for the prevention of probing attacks. Usually d < 10 in probing attacks, whereas HTH are able to connect to more than 10 nets. In this paper, we discuss the theory behind \"encoded circuits\" and its practical demonstration on various HDL circuits.","PeriodicalId":434126,"journal":{"name":"WESS '14","volume":"24 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"16","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"WESS '14","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/2668322.2668329","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 16

Abstract

Hardware Trojan Horses (HTH) are a serious threat to semiconductor industry with significant economic impact. However, most of the research in HTH focuses on detection. We propose the concept of "encoded circuit", as a technique to protect HTH insertion. Encoded circuit is based on the theory of codes. It encodes the internal state with a chosen code of security parameter d, such that knowledge of less than d bits of the encoded state reveals no information about the actual state. This parameter stems from a similar notion introduced by Ishai, Sahai and Wagner at CRYPTO 2003 for the prevention of probing attacks. Usually d < 10 in probing attacks, whereas HTH are able to connect to more than 10 nets. In this paper, we discuss the theory behind "encoded circuits" and its practical demonstration on various HDL circuits.
编码集成电路的状态:一种针对硬件木马的主动和被动保护
硬件木马(Hardware Trojan木马,HTH)是对半导体产业的严重威胁,具有重大的经济影响。然而,HTH的大部分研究都集中在检测上。我们提出了“编码电路”的概念,作为一种保护HTH插入的技术。编码电路是以码的理论为基础的。它用安全参数d的选定代码对内部状态进行编码,这样,对编码状态少于d位的知识就不会揭示有关实际状态的信息。该参数源于Ishai, Sahai和Wagner在CRYPTO 2003上为防止探测攻击而引入的类似概念。探测攻击通常d < 10,而HTH可以连接10个以上的网络。在本文中,我们讨论了“编码电路”背后的理论及其在各种HDL电路中的实际演示。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信