Hardware Trojan or any other kind of unwanted hardware modifications has been thought as a major challenge in many commercial and secure applications. Currently, detection and prevention of hardware Trojans appeared as an important requirement in such systems. In this paper, a new concept, Trojan Vulnerability Map, is introduced to model the immunity of various regions of hardware against hardware attacks. Then, placement and routing algorithms are proposed to improve the immunity of hardware using the Trojan Vulnerability Map. Experimental results show that the proposed placement and routing algorithm reduces the hardware vulnerability by 25.65% and 4.08%, respectively. These benefits are earned in cost of negligible total wire length and delay overhead.
Mahmoud BAKHSHIZADEH
Shahid Beheshti University
Ali JAHANIAN
Shahid Beheshti University
The copyright of the original papers published on this site belongs to IEICE. Unauthorized use of the original or translated papers is prohibited. See IEICE Provisions on Copyright for details.
Copy
Mahmoud BAKHSHIZADEH, Ali JAHANIAN, "Trojan Vulnerability Map: An Efficient Metric for Modeling and Improving the Security Level of Hardware" in IEICE TRANSACTIONS on Fundamentals,
vol. E97-A, no. 11, pp. 2218-2226, November 2014, doi: 10.1587/transfun.E97.A.2218.
Abstract: Hardware Trojan or any other kind of unwanted hardware modifications has been thought as a major challenge in many commercial and secure applications. Currently, detection and prevention of hardware Trojans appeared as an important requirement in such systems. In this paper, a new concept, Trojan Vulnerability Map, is introduced to model the immunity of various regions of hardware against hardware attacks. Then, placement and routing algorithms are proposed to improve the immunity of hardware using the Trojan Vulnerability Map. Experimental results show that the proposed placement and routing algorithm reduces the hardware vulnerability by 25.65% and 4.08%, respectively. These benefits are earned in cost of negligible total wire length and delay overhead.
URL: https://global.ieice.org/en_transactions/fundamentals/10.1587/transfun.E97.A.2218/_p
Copy
@ARTICLE{e97-a_11_2218,
author={Mahmoud BAKHSHIZADEH, Ali JAHANIAN, },
journal={IEICE TRANSACTIONS on Fundamentals},
title={Trojan Vulnerability Map: An Efficient Metric for Modeling and Improving the Security Level of Hardware},
year={2014},
volume={E97-A},
number={11},
pages={2218-2226},
abstract={Hardware Trojan or any other kind of unwanted hardware modifications has been thought as a major challenge in many commercial and secure applications. Currently, detection and prevention of hardware Trojans appeared as an important requirement in such systems. In this paper, a new concept, Trojan Vulnerability Map, is introduced to model the immunity of various regions of hardware against hardware attacks. Then, placement and routing algorithms are proposed to improve the immunity of hardware using the Trojan Vulnerability Map. Experimental results show that the proposed placement and routing algorithm reduces the hardware vulnerability by 25.65% and 4.08%, respectively. These benefits are earned in cost of negligible total wire length and delay overhead.},
keywords={},
doi={10.1587/transfun.E97.A.2218},
ISSN={1745-1337},
month={November},}
Copy
TY - JOUR
TI - Trojan Vulnerability Map: An Efficient Metric for Modeling and Improving the Security Level of Hardware
T2 - IEICE TRANSACTIONS on Fundamentals
SP - 2218
EP - 2226
AU - Mahmoud BAKHSHIZADEH
AU - Ali JAHANIAN
PY - 2014
DO - 10.1587/transfun.E97.A.2218
JO - IEICE TRANSACTIONS on Fundamentals
SN - 1745-1337
VL - E97-A
IS - 11
JA - IEICE TRANSACTIONS on Fundamentals
Y1 - November 2014
AB - Hardware Trojan or any other kind of unwanted hardware modifications has been thought as a major challenge in many commercial and secure applications. Currently, detection and prevention of hardware Trojans appeared as an important requirement in such systems. In this paper, a new concept, Trojan Vulnerability Map, is introduced to model the immunity of various regions of hardware against hardware attacks. Then, placement and routing algorithms are proposed to improve the immunity of hardware using the Trojan Vulnerability Map. Experimental results show that the proposed placement and routing algorithm reduces the hardware vulnerability by 25.65% and 4.08%, respectively. These benefits are earned in cost of negligible total wire length and delay overhead.
ER -