Dynamic FPGA Detection and Protection of Hardware Trojan: A Comparative Analysis

11/03/2017
by   Amr Alanwar, et al.
0

Hardware Trojan detection and protection is becoming more crucial as more untrusted third parties manufacture many parts of critical systems nowadays. The most common way to detect hardware Trojans is comparing the untrusted design with a golden (trusted) one. However, third-party intellectual properties (IPs) are black boxes with no golden IPs to trust. So, previous attempts to detect hardware Trojans will not work with third-party IPs. In this work, we present novel methods for Trojan protection and detection on field programmable gate arrays (FPGAs) without the need for golden chips. Presented methods work at runtime instead of test time. We provide a wide spectrum of Trojan detection and protection methods. While the simplest methods have low overhead and provide limited protection mechanisms, more sophisticated and costly techniques are introduced that can detect hardware Trojans and even clean up the system from infected IPs. Moreover, we study the cost of using the FPGA partial reconfiguration feature to get rid of infected IPs. In addition, we discuss the possibility to construct IP core certificate authority that maintains a centralized database of unsafe vendors and IPs. We show the practicality of the introduced schemes by implementing the different methodologies on FPGAs. Results show that simple methods present negligible overheads and as we try to increase security the delay and power overheads increase.

READ FULL TEXT
research
05/15/2020

A CRISPR-Cas-Inspired Mechanism for Detecting Hardware Trojans in FPGA Devices

Hardware security has risen in prominence in recent years with concerns ...
research
03/12/2018

Hardware Trojan Detection through Information Flow Security Verification

Semiconductor design houses are increasingly becoming dependent on third...
research
07/10/2023

Towards Runtime Customizable Trusted Execution Environment on FPGA-SoC

Processing sensitive data and deploying well-designed Intellectual Prope...
research
10/01/2019

A Look at the Dark Side of Hardware Reverse Engineering – A Case Study

A massive threat to the modern and complex IC production chain is the us...
research
02/12/2018

Cryptographically Secure Multi-Tenant Provisioning of FPGAs

FPGAs (Field Programmable Gate arrays) have gained massive popularity to...
research
10/01/2019

Stealthy Opaque Predicates in Hardware – Obfuscating Constant Expressions at Negligible Overhead

Opaque predicates are a well-established fundamental building block for ...
research
01/17/2023

A Review of Techniques for Ageing Detection and Monitoring on Embedded Systems

Embedded digital devices, such as Field-Programmable Gate Arrays (FPGAs)...

Please sign up or login with your details

Forgot password? Click here to reset