论文标题
可变性意识到使用可靠延迟分析的硬件木马检测的黄金参考方法
Variability aware Golden Reference Free methodology for Hardware Trojan Detection Using Robust Delay Analysis
论文作者
论文摘要
许多Fables的半导体公司将其设计外包给第三方制造房屋。由于尚未建立外包之后的链条信任度,因此在两者之间进行任何对手,具有恶意意图,可以通过插入硬件木马(HTS)来篡改设计。检测此类HTS对于确保芯片的信任和完整性至关重要。但是,基于侧通道分析的检测技术的效率在很大程度上受过程变化的影响。在本文中,提出了一种通过分析拓扑对称路径的延迟来检测HTS的方法。提出的技术,而不是依赖于黄金IC作为HT检测的参考,它采用了自我引用的概念。在这项工作中,IC中拓扑对称路径的延迟将受到过程变化的影响。提出了一种最小化受过程变化影响的拓扑对称路径的程序。此外,提出了一种技术,即如果本质上的设计中不存在此类路径,则通过插入额外的逻辑门来创建拓扑对称路径。对ISCAS-85基准进行的模拟表明,所提出的方法能够达到100%的真实正率,假正率小于3%。在我们的实验中,我们考虑了最大阈值电压(VTH)的最大内部内部和20%的差异变化。
Many fabless semiconductor companies outsource their designs to third-party fabrication houses. As trustworthiness of chain after outsourcing including fabrication houses is not established, any adversary in between, with malicious intent may tamper the design by inserting Hardware Trojans (HTs). Detection of such HTs is of utmost importance to assure the trust and integrity of the chips. However, the efficiency of detection techniques based on side-channel analysis is largely affected by process variations. In this paper, a methodology for detecting HTs by analyzing the delays of topologically symmetric paths is proposed. The proposed technique, rather than depending on golden ICs as a reference for HT detection, employs the concept of self-referencing. In this work, the fact that delays of topologically symmetric paths in an IC will be affected similarly by process variations is exploited. A procedure to chose topologically symmetric paths that are minimally affected by process variations is presented. Further, a technique is proposed to create topologically symmetric paths by inserting extra logic gates if such paths do not exist in the design intrinsically. Simulations performed on ISCAS-85 benchmarks establish that the proposed method is able to achieve a true positive rate of 100% with a false positive rate less than 3%. In our experimentation, We have considered the maximum of 15% intra-die and 20% inter-die variations in threshold voltage (Vth).