Reusing Logic Masking to Facilitate Hardware Trojan Detection

Cita com:
hdl:2117/99303
Document typeConference report
Defense date2016-11-16
Rights accessOpen Access
This work is protected by the corresponding intellectual and industrial property rights.
Except where otherwise noted, its contents are licensed under a Creative Commons license
:
Attribution-NonCommercial-NoDerivs 3.0 Spain
Abstract
Hardware Trojan (HT) and Integrated Circuit
(IC)/ Intellectual Property (IP) piracy are important threats
which may happen in untrusted fabrication foundries. Modifying
structurally the ICs/IPs design to counter the HT threats has
been proposed, and it is known as Design-For-Hardware-Trust
(DFHT). DFHT methods are used in order to facilitate HT
detection methods. In addition, logic masking methods modify
the IPs/ICs design to harden them against the IP/IC piracy.
These methods modify a circuit such that it does not work
correctly without applying the correct key. In this paper, we
propose DFHT methods leveraging logic masking approach.
Files | Description | Size | Format | View |
---|---|---|---|---|
FCTRU_2016_23_Reusing_Logic_Masking.pdf | 717,8Kb | View/Open |