{"title":"模糊TMR在处理硬件木马中的有效应用","authors":"Masoume Mehdinia Siboni, Seyed Mohammadhossein Shekarian","doi":"10.1109/ICCKE48569.2019.8964879","DOIUrl":null,"url":null,"abstract":"Redundancy-based techniques are used in the literature to neutralize the effects of hardware Trojan horses (HTHs). However, the available techniques assume that HTHs cannot be inserted into the replicated logic, without introducing recognizable changes in the side effects of the circuit. In this paper, we discuss the limitations of this assumption. We demonstrate that fault-tolerant techniques should be enhanced by obfuscation methods to be actually effective, and we propose a novel obfuscated TMR (Triple Modular Redundancy) to prove the concept. We evaluated the effectiveness of our approach on ISCAS benchmarks. The results show that Trojans would incur about 18% higher detection risk in average, if attackers try to deceive the obfuscated TMR.","PeriodicalId":6685,"journal":{"name":"2019 9th International Conference on Computer and Knowledge Engineering (ICCKE)","volume":"25 1","pages":"12-17"},"PeriodicalIF":0.0000,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"An Effective Application of Obfuscated TMR to Tackle Hardware Trojans\",\"authors\":\"Masoume Mehdinia Siboni, Seyed Mohammadhossein Shekarian\",\"doi\":\"10.1109/ICCKE48569.2019.8964879\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Redundancy-based techniques are used in the literature to neutralize the effects of hardware Trojan horses (HTHs). However, the available techniques assume that HTHs cannot be inserted into the replicated logic, without introducing recognizable changes in the side effects of the circuit. In this paper, we discuss the limitations of this assumption. We demonstrate that fault-tolerant techniques should be enhanced by obfuscation methods to be actually effective, and we propose a novel obfuscated TMR (Triple Modular Redundancy) to prove the concept. We evaluated the effectiveness of our approach on ISCAS benchmarks. The results show that Trojans would incur about 18% higher detection risk in average, if attackers try to deceive the obfuscated TMR.\",\"PeriodicalId\":6685,\"journal\":{\"name\":\"2019 9th International Conference on Computer and Knowledge Engineering (ICCKE)\",\"volume\":\"25 1\",\"pages\":\"12-17\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-10-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2019 9th International Conference on Computer and Knowledge Engineering (ICCKE)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCKE48569.2019.8964879\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 9th International Conference on Computer and Knowledge Engineering (ICCKE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCKE48569.2019.8964879","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
An Effective Application of Obfuscated TMR to Tackle Hardware Trojans
Redundancy-based techniques are used in the literature to neutralize the effects of hardware Trojan horses (HTHs). However, the available techniques assume that HTHs cannot be inserted into the replicated logic, without introducing recognizable changes in the side effects of the circuit. In this paper, we discuss the limitations of this assumption. We demonstrate that fault-tolerant techniques should be enhanced by obfuscation methods to be actually effective, and we propose a novel obfuscated TMR (Triple Modular Redundancy) to prove the concept. We evaluated the effectiveness of our approach on ISCAS benchmarks. The results show that Trojans would incur about 18% higher detection risk in average, if attackers try to deceive the obfuscated TMR.