Please use this identifier to cite or link to this item:
http://hdl.handle.net/2080/2339
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Kumar K, S | - |
dc.contributor.author | Chanamala, R | - |
dc.contributor.author | Sahoo, S R | - |
dc.contributor.author | Mahapatra, K K | - |
dc.date.accessioned | 2015-07-07T11:53:25Z | - |
dc.date.available | 2015-07-07T11:53:25Z | - |
dc.date.issued | 2015-06 | - |
dc.identifier.citation | 19th International Symposium on VLSI Design and Test (VDAT-2015),Institute of Technology, Nirma University, Ahmedabad, India.26-29 June 2015. | en_US |
dc.identifier.uri | http://hdl.handle.net/2080/2339 | - |
dc.description | Copyright belong to proceeding publisher | en_US |
dc.description.abstract | The semiconductor design industry has globalized and it is economical for the chip makers to get services from the different geographies in design, manufacturing and testing. Globalization raises the question of trust in an integrated circuit. It is for the every chip maker to ensure there is no malicious inclusion in the design, which is referred as Hardware Trojans. Malicious inclusion can occur by an in-house adversary design engineer, Intellectual Property (IP) core supplied from the third party vendor or at untrusted manufacturing foundry. Several researchers have proposed hardware Trojan detection schemes in the recent years. Trust-Hub provides Trojan benchmark circuits to verify the strength of the Trojan detection techniques. In this work, our focus is on Advanced Encryption Standard (AES) Trojan benchmarks, which is most vulnerable block cipher for Trojan attacks. All 21 Benchmarks available in Trusthub are analyzed against standard coverage driven verification practices, synthesis, DFT insertion and ATPG simulations. The analysis reveals that 19 AES benchmarks are weak and Trojan inclusion can be detected using standard procedures used in ASIC design flow. Based on the weakness observed design modification is proposed to improve the quality of Trojan benchmarks. The strength of proposed Trojan benchmarks is better than existing circuits and their original features are also preserved after design modification | en_US |
dc.language.iso | en | en_US |
dc.subject | Hardware Trojan | en_US |
dc.subject | AES | en_US |
dc.subject | Trust-Hub | en_US |
dc.subject | Security | en_US |
dc.subject | ASIC | en_US |
dc.title | An Improved AES Hardware Trojan Benchmark to Validate Trojan Detection Schemes in an ASIC Design Flow | en_US |
dc.type | Article | en_US |
Appears in Collections: | Conference Papers |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
vdat-2015-trojan_camera.pdf | 465.26 kB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.