Skip to main content

2018 | OriginalPaper | Buchkapitel

CRC-Based Hardware Trojan Detection for Improved Hardware Security

verfasst von : N. Mohankumar, M. Jayakumar, M. Nirmala Devi

Erschienen in: Microelectronics, Electromagnetics and Telecommunications

Verlag: Springer Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Several methodologies aim at tackling the issue of Hardware Trojans through the help of a “Golden Reference”, which is not always available; thereby arises the need for an efficient method without a Golden Reference. This work involves the detection of Hardware Trojan in a circuit using an improved voting algorithm employing CRC. Two modifications to a conventional voting algorithm are proposed in this chapter along with CRC to improve the detection efficiency. This logic-based detection procedure avoids the requirements of complex pre-processing procedures like segmentation, fingerprinting, thermal imaging, etc., The following proposed modifications (i) incapacitates the bias toward 1s and incorporating CRC for comparison of bit streams and (ii) equal weight of 1 is given as initial weight to all CUTs, which gives better results in voting algorithm. Detection accuracy is found to be around 95.27% based on the detailed analysis with infected and non-infected ISCAS’85 and ISCAS’89 circuits.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat M. Tehranipoor, F. Koushanjar, ‘A Survey of Hardware Trojan Taxonomy and Detection’, IEEE Design & Test, PP.1–1, 2013. M. Tehranipoor, F. Koushanjar, ‘A Survey of Hardware Trojan Taxonomy and Detection’, IEEE Design & Test, PP.1–1, 2013.
2.
Zurück zum Zitat Tehranipoor M, Salmani H, Zhang X, Wang X, Karri R, Rajendran J, et al. Trustworthy hardware: Trojan detection and design for-trust challenges. Computer 2011;44(7):66–74. Tehranipoor M, Salmani H, Zhang X, Wang X, Karri R, Rajendran J, et al. Trustworthy hardware: Trojan detection and design for-trust challenges. Computer 2011;44(7):66–74.
3.
Zurück zum Zitat Mohammad Tehranipoor and Cliff Wang, editors. Introduction to Hardware Security and Trust. Springer, 2012. ISBN 978-1-4419-8079-3. Mohammad Tehranipoor and Cliff Wang, editors. Introduction to Hardware Security and Trust. Springer, 2012. ISBN 978-1-4419-8079-3.
4.
Zurück zum Zitat H. Amin, Y. Alkabani and G. Selim, ‘System-level protection and Hardware Trojan detection using weighted voting’, Journal of Advanced Research, Vol.5, no.4, PP.499–505, 2014. H. Amin, Y. Alkabani and G. Selim, ‘System-level protection and Hardware Trojan detection using weighted voting’, Journal of Advanced Research, Vol.5, no.4, PP.499–505, 2014.
5.
Zurück zum Zitat G. Latif-Shabgahi, J.M. Bass, S. Bennett, History-Based Weighed Average Voter: A Novel Software Voting Algorithm for Fault-Tolerant Computer Systems, Proc. PDP2001: 9th Euromicro Workshop on Parallel and Distributed Processing, February 7–9, Italy, (2001). G. Latif-Shabgahi, J.M. Bass, S. Bennett, History-Based Weighed Average Voter: A Novel Software Voting Algorithm for Fault-Tolerant Computer Systems, Proc. PDP2001: 9th Euromicro Workshop on Parallel and Distributed Processing, February 7–9, Italy, (2001).
6.
Zurück zum Zitat R. Bharath, G. Arun Sabari, Dhinesh Ravi Krishna, Arun Prasathe, K. Harish, N. Mohankumar, M. Nirmala Devi, “Malicious Circuit Detection for Improved Hardware Security”, In Proc. of The Third International Symposium on Security in Computing and Communications (SSCC’15), Vol.:536, pp:464–472. 2015. R. Bharath, G. Arun Sabari, Dhinesh Ravi Krishna, Arun Prasathe, K. Harish, N. Mohankumar, M. Nirmala Devi, “Malicious Circuit Detection for Improved Hardware Security”, In Proc. of The Third International Symposium on Security in Computing and Communications (SSCC’15), Vol.:536, pp:464–472. 2015.
7.
Zurück zum Zitat Venkata Raja et al., “HAPMAD: Hardware Based Authentication Platform for Malicious Activity Detection in Digital Circuits,” 4th International Conference On Information System Design And Intelligent Applications, (India - 2017) 2017, Vietnam. Venkata Raja et al., “HAPMAD: Hardware Based Authentication Platform for Malicious Activity Detection in Digital Circuits,” 4th International Conference On Information System Design And Intelligent Applications, (India - 2017) 2017, Vietnam.
8.
Zurück zum Zitat A. Al-Anwar, Y. Alkabani, M.W. El-Kharashi, and H. Bedour. Defeating hardware spyware in third party IPs. In Saudi Intl. Electronics, Communications and Photonics Conference (SIECPC), 2013. A. Al-Anwar, Y. Alkabani, M.W. El-Kharashi, and H. Bedour. Defeating hardware spyware in third party IPs. In Saudi Intl. Electronics, Communications and Photonics Conference (SIECPC), 2013.
Metadaten
Titel
CRC-Based Hardware Trojan Detection for Improved Hardware Security
verfasst von
N. Mohankumar
M. Jayakumar
M. Nirmala Devi
Copyright-Jahr
2018
Verlag
Springer Singapore
DOI
https://doi.org/10.1007/978-981-10-7329-8_39

Neuer Inhalt