Keyed logic BIST for Trojan detection in SoC
(2014) 2014 16th International Symposium on System-on-Chip, SoC 2014 In 2014 International Symposium on System-on-Chip, SoC 2014- Abstract
As demonstrated by the recent attack on Intel's Ivy Bridge processor, the traditional Logic Built-In Self-Test (LBIST) methods do not provide adequate protection of SoC against malicious modifications known as hardware Trojans. In this paper, we introduce a simple but efficient countermeasure against hardware Trojans which exploits non-zero aliasing probability of LBIST. We propose to generate LBIST test patterns based on a configurable key which is decided and programed into the circuit after the manufacturing stage. Since the key and hence expected LBIST signature are unknown at the manufacturing stage, an attack based on selecting suitable values for the Trojan which result in the same signature as a fault-free circuit signature... (More)
As demonstrated by the recent attack on Intel's Ivy Bridge processor, the traditional Logic Built-In Self-Test (LBIST) methods do not provide adequate protection of SoC against malicious modifications known as hardware Trojans. In this paper, we introduce a simple but efficient countermeasure against hardware Trojans which exploits non-zero aliasing probability of LBIST. We propose to generate LBIST test patterns based on a configurable key which is decided and programed into the circuit after the manufacturing stage. Since the key and hence expected LBIST signature are unknown at the manufacturing stage, an attack based on selecting suitable values for the Trojan which result in the same signature as a fault-free circuit signature becomes infeasible.
(Less)
- author
- Dubrova, Elena ; Naslund, Mats ; Carlsson, Gunnar and Smeets, Ben LU
- publishing date
- 2014-12-02
- type
- Chapter in Book/Report/Conference proceeding
- publication status
- published
- subject
- host publication
- 2014 International Symposium on System-on-Chip, SoC 2014
- series title
- 2014 International Symposium on System-on-Chip, SoC 2014
- editor
- Daniel, Ondrej ; Ellervee, Peeter ; Milojevic, Dragomir ; Nurmi, Jari and Paakki, Tommi
- article number
- 6972433
- publisher
- IEEE - Institute of Electrical and Electronics Engineers Inc.
- conference name
- 2014 16th International Symposium on System-on-Chip, SoC 2014
- conference location
- Tampere, Finland
- conference dates
- 2014-10-28 - 2014-10-29
- external identifiers
-
- scopus:84919360616
- ISBN
- 9781479968909
- DOI
- 10.1109/ISSOC.2014.6972433
- language
- English
- LU publication?
- no
- additional info
- Publisher Copyright: © 2014 IEEE.
- id
- 672c4240-4627-49bb-a611-bd1e3a6b7cbd
- date added to LUP
- 2021-11-05 02:32:29
- date last changed
- 2024-05-04 16:43:53
@inproceedings{672c4240-4627-49bb-a611-bd1e3a6b7cbd, abstract = {{<p>As demonstrated by the recent attack on Intel's Ivy Bridge processor, the traditional Logic Built-In Self-Test (LBIST) methods do not provide adequate protection of SoC against malicious modifications known as hardware Trojans. In this paper, we introduce a simple but efficient countermeasure against hardware Trojans which exploits non-zero aliasing probability of LBIST. We propose to generate LBIST test patterns based on a configurable key which is decided and programed into the circuit after the manufacturing stage. Since the key and hence expected LBIST signature are unknown at the manufacturing stage, an attack based on selecting suitable values for the Trojan which result in the same signature as a fault-free circuit signature becomes infeasible.</p>}}, author = {{Dubrova, Elena and Naslund, Mats and Carlsson, Gunnar and Smeets, Ben}}, booktitle = {{2014 International Symposium on System-on-Chip, SoC 2014}}, editor = {{Daniel, Ondrej and Ellervee, Peeter and Milojevic, Dragomir and Nurmi, Jari and Paakki, Tommi}}, isbn = {{9781479968909}}, language = {{eng}}, month = {{12}}, publisher = {{IEEE - Institute of Electrical and Electronics Engineers Inc.}}, series = {{2014 International Symposium on System-on-Chip, SoC 2014}}, title = {{Keyed logic BIST for Trojan detection in SoC}}, url = {{http://dx.doi.org/10.1109/ISSOC.2014.6972433}}, doi = {{10.1109/ISSOC.2014.6972433}}, year = {{2014}}, }