The search functionality is under construction.
The search functionality is under construction.

Trojan Vulnerability Map: An Efficient Metric for Modeling and Improving the Security Level of Hardware

Mahmoud BAKHSHIZADEH, Ali JAHANIAN

  • Full Text Views

    0

  • Cite this

Summary :

Hardware Trojan or any other kind of unwanted hardware modifications has been thought as a major challenge in many commercial and secure applications. Currently, detection and prevention of hardware Trojans appeared as an important requirement in such systems. In this paper, a new concept, Trojan Vulnerability Map, is introduced to model the immunity of various regions of hardware against hardware attacks. Then, placement and routing algorithms are proposed to improve the immunity of hardware using the Trojan Vulnerability Map. Experimental results show that the proposed placement and routing algorithm reduces the hardware vulnerability by 25.65% and 4.08%, respectively. These benefits are earned in cost of negligible total wire length and delay overhead.

Publication
IEICE TRANSACTIONS on Fundamentals Vol.E97-A No.11 pp.2218-2226
Publication Date
2014/11/01
Publicized
Online ISSN
1745-1337
DOI
10.1587/transfun.E97.A.2218
Type of Manuscript
PAPER
Category
VLSI Design Technology and CAD

Authors

Mahmoud BAKHSHIZADEH
  Shahid Beheshti University
Ali JAHANIAN
  Shahid Beheshti University

Keyword