Skip to main content

Lund University Publications

LUND UNIVERSITY LIBRARIES

Keyed logic BIST for Trojan detection in SoC

Dubrova, Elena ; Naslund, Mats ; Carlsson, Gunnar and Smeets, Ben LU orcid (2014) 2014 16th International Symposium on System-on-Chip, SoC 2014 In 2014 International Symposium on System-on-Chip, SoC 2014
Abstract

As demonstrated by the recent attack on Intel's Ivy Bridge processor, the traditional Logic Built-In Self-Test (LBIST) methods do not provide adequate protection of SoC against malicious modifications known as hardware Trojans. In this paper, we introduce a simple but efficient countermeasure against hardware Trojans which exploits non-zero aliasing probability of LBIST. We propose to generate LBIST test patterns based on a configurable key which is decided and programed into the circuit after the manufacturing stage. Since the key and hence expected LBIST signature are unknown at the manufacturing stage, an attack based on selecting suitable values for the Trojan which result in the same signature as a fault-free circuit signature... (More)

As demonstrated by the recent attack on Intel's Ivy Bridge processor, the traditional Logic Built-In Self-Test (LBIST) methods do not provide adequate protection of SoC against malicious modifications known as hardware Trojans. In this paper, we introduce a simple but efficient countermeasure against hardware Trojans which exploits non-zero aliasing probability of LBIST. We propose to generate LBIST test patterns based on a configurable key which is decided and programed into the circuit after the manufacturing stage. Since the key and hence expected LBIST signature are unknown at the manufacturing stage, an attack based on selecting suitable values for the Trojan which result in the same signature as a fault-free circuit signature becomes infeasible.

(Less)
Please use this url to cite or link to this publication:
author
; ; and
publishing date
type
Chapter in Book/Report/Conference proceeding
publication status
published
subject
host publication
2014 International Symposium on System-on-Chip, SoC 2014
series title
2014 International Symposium on System-on-Chip, SoC 2014
editor
Daniel, Ondrej ; Ellervee, Peeter ; Milojevic, Dragomir ; Nurmi, Jari and Paakki, Tommi
article number
6972433
publisher
IEEE - Institute of Electrical and Electronics Engineers Inc.
conference name
2014 16th International Symposium on System-on-Chip, SoC 2014
conference location
Tampere, Finland
conference dates
2014-10-28 - 2014-10-29
external identifiers
  • scopus:84919360616
ISBN
9781479968909
DOI
10.1109/ISSOC.2014.6972433
language
English
LU publication?
no
additional info
Publisher Copyright: © 2014 IEEE.
id
672c4240-4627-49bb-a611-bd1e3a6b7cbd
date added to LUP
2021-11-05 02:32:29
date last changed
2024-05-04 16:43:53
@inproceedings{672c4240-4627-49bb-a611-bd1e3a6b7cbd,
  abstract     = {{<p>As demonstrated by the recent attack on Intel's Ivy Bridge processor, the traditional Logic Built-In Self-Test (LBIST) methods do not provide adequate protection of SoC against malicious modifications known as hardware Trojans. In this paper, we introduce a simple but efficient countermeasure against hardware Trojans which exploits non-zero aliasing probability of LBIST. We propose to generate LBIST test patterns based on a configurable key which is decided and programed into the circuit after the manufacturing stage. Since the key and hence expected LBIST signature are unknown at the manufacturing stage, an attack based on selecting suitable values for the Trojan which result in the same signature as a fault-free circuit signature becomes infeasible.</p>}},
  author       = {{Dubrova, Elena and Naslund, Mats and Carlsson, Gunnar and Smeets, Ben}},
  booktitle    = {{2014 International Symposium on System-on-Chip, SoC 2014}},
  editor       = {{Daniel, Ondrej and Ellervee, Peeter and Milojevic, Dragomir and Nurmi, Jari and Paakki, Tommi}},
  isbn         = {{9781479968909}},
  language     = {{eng}},
  month        = {{12}},
  publisher    = {{IEEE - Institute of Electrical and Electronics Engineers Inc.}},
  series       = {{2014 International Symposium on System-on-Chip, SoC 2014}},
  title        = {{Keyed logic BIST for Trojan detection in SoC}},
  url          = {{http://dx.doi.org/10.1109/ISSOC.2014.6972433}},
  doi          = {{10.1109/ISSOC.2014.6972433}},
  year         = {{2014}},
}