Publication | Open Access
A novel hardware logic encryption technique for thwarting illegal overproduction and Hardware Trojans
219
Citations
12
References
2014
Year
Unknown Venue
Hardware TrojanHardware PiracyEngineeringInformation SecurityComputer ArchitectureInformation ForensicsSide-channel AttackFormal VerificationHardware SecurityTrusted Execution EnvironmentHardware Security SolutionComputer EngineeringData PrivacyHardware TrojansComputer ScienceData SecurityCryptographyCryptographic ProtectionAttack ModelFormal MethodsIllegal OverproductionLow ControllabilityFault Attack
Hardware piracy is a threat that is becoming more and more serious these last years. The different types of threats include mask theft, illegal overproduction, as well as the insertion of malicious alterations to a circuit, referred to as Hardware Trojans. To protect circuits from overproduction, circuits can be encrypted so that only authorized users can use the circuits. In this paper, we propose an encryption technique that also helps thwarting Hardware Trojan insertion. Assuming that an attacker will attach a Hardware Trojan to signals with low controllability in order to make it stealthy, the principle of the encryption is to minimize the number of signals with low controllability.
| Year | Citations | |
|---|---|---|
Page 1
Page 1