Back to Search
Start Over
A novel hardware logic encryption technique for thwarting illegal overproduction and Hardware Trojans
- Source :
- IOLTS, 20th International, Testing Symposium, IOLTS: International, Testing Symposium, Jul 2014, Platja d'Aro, Girona, Spain. pp.49-54, ⟨10.1109/IOLTS.2014.6873671⟩
- Publication Year :
- 2014
- Publisher :
- IEEE, 2014.
-
Abstract
- International audience; Hardware piracy is a threat that is becoming more and more serious these last years. The different types of threats include mask theft, illegal overproduction, as well as the insertion of malicious alterations to a circuit, referred to as Hardware Trojans. To protect circuits from overproduction, circuits can be encrypted so that only authorized users can use the circuits. In this paper, we propose an encryption technique that also helps thwarting Hardware Trojan insertion. Assuming that an attacker will attach a Hardware Trojan to signals with low controllability in order to make it stealthy, the principle of the encryption is to minimize the number of signals with low controllability.
- Subjects :
- Engineering
Software_OPERATINGSYSTEMS
business.industry
Logic testing
ComputingMilieux_LEGALASPECTSOFCOMPUTING
Hardware Trojan Detection
Hardware Trojan
Encryption
Computer security
computer.software_genre
Disk encryption hardware
Controllability
ComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMS
Embedded system
Hardware obfuscation
Logic locking
[SPI.NANO]Engineering Sciences [physics]/Micro and nanotechnologies/Microelectronics
Hardware Trojan Activation
business
Logic Encryption
computer
Computer hardware
Electronic circuit
Subjects
Details
- Database :
- OpenAIRE
- Journal :
- 2014 IEEE 20th International On-Line Testing Symposium (IOLTS)
- Accession number :
- edsair.doi.dedup.....eb2e0f8ec37112f7ed548c5171ba0b49
- Full Text :
- https://doi.org/10.1109/iolts.2014.6873671