Back to Search Start Over

A novel hardware logic encryption technique for thwarting illegal overproduction and Hardware Trojans

Authors :
Bruno Rouzeyre
Giorgio Di Natale
Sophie Dupuis
Marie-Lise Flottes
Papa-Sidi Ba
Conception et Test de Systèmes MICroélectroniques (SysMIC)
Laboratoire d'Informatique de Robotique et de Microélectronique de Montpellier (LIRMM)
Centre National de la Recherche Scientifique (CNRS)-Université de Montpellier (UM)-Centre National de la Recherche Scientifique (CNRS)-Université de Montpellier (UM)
Source :
IOLTS, 20th International, Testing Symposium, IOLTS: International, Testing Symposium, Jul 2014, Platja d'Aro, Girona, Spain. pp.49-54, ⟨10.1109/IOLTS.2014.6873671⟩
Publication Year :
2014
Publisher :
IEEE, 2014.

Abstract

International audience; Hardware piracy is a threat that is becoming more and more serious these last years. The different types of threats include mask theft, illegal overproduction, as well as the insertion of malicious alterations to a circuit, referred to as Hardware Trojans. To protect circuits from overproduction, circuits can be encrypted so that only authorized users can use the circuits. In this paper, we propose an encryption technique that also helps thwarting Hardware Trojan insertion. Assuming that an attacker will attach a Hardware Trojan to signals with low controllability in order to make it stealthy, the principle of the encryption is to minimize the number of signals with low controllability.

Details

Database :
OpenAIRE
Journal :
2014 IEEE 20th International On-Line Testing Symposium (IOLTS)
Accession number :
edsair.doi.dedup.....eb2e0f8ec37112f7ed548c5171ba0b49
Full Text :
https://doi.org/10.1109/iolts.2014.6873671