Skip to main content

Trojan Prevention: Built-In Self-Authentication

  • Chapter
  • First Online:
Book cover Integrated Circuit Authentication

Abstract

The complexity and cost of IC fabrication significantly increases as the technology for integrated circuits (ICs) shrinks to very deep sub-micron levels. As companies increasingly outsource design and fabrication for economic reasons, it has become easier for adversaries to implant a Trojan by modifying the layout of a circuit during GDSII development and fabrication. A circuit’s unused spaces provide great opportunities for Trojan insertion.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 89.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 119.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 129.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. M. Tehranipoor and F. Koushanfar, “A Survey of Hardware Trojan Taxonomy and Detection,” IEEE Design and Test of Computers, pp. 10–25, January-February 2010.

    Google Scholar 

  2. M. Banga and M. Hsiao, “A novel sustained vector technique for the detection of hardware trojans,” IEEE VLSI Design, pp. 327–332, Jan. 2009.

    Google Scholar 

  3. R. Chakraborty, F. Wolff, S. Paul, C. Papachristou, and S. Bhunia, “MERO: A statistical approach for hardware Trojan detection,” Workshop on Cryptographic Hardware and Embedded Systems, pp. 396–410, 2009.

    Google Scholar 

  4. D. Agrawal, S. Baktir, and D. Karakoyunlu, P. Rohatgi, and B. Sunar, “Trojan Detection using IC Fingerprinting,” IEEE Symp. on Security and Privacy (SP), pp. 296–310, 2007.

    Google Scholar 

  5. J.Aarestad, D. Acharyya, R. Rad, and J. Plusquellic, “Detecting Trojans through leakage current analysis multiple supply pad IDDQs,” IEEE Transactions on Information Forensics and Security, vol. 5, issue 4, pp. 893–904, 2010.

    Article  Google Scholar 

  6. Y. Jin and Y. Makris, “Hardware Trojan Detection using Path Delay Fingerprint,” IEEE Int. Workshop on Hardware-Oriented Security and Trust (HOST), pp. 51–57, 2008.

    Google Scholar 

  7. H. Salmani, M. Tehranipoor, and J. Plusquellic, “A Novel Technique for Improving Hardware Trojan Detection and Reducing Trojan Activation Time,” IEEE Transactions on VLSI, 2011.

    Google Scholar 

  8. J. Li and J. Lach, “At-Speed Delay Characterization for IC Authentication and Trojan Horse Detection,” IEEE Int. Hardware-Oriented Security and Trust (HOST), pp. 8–14, 2008.

    Google Scholar 

  9. Y. Jin, N. Kupp, and Y. Makris, “DFTT: Design for Trojan Test,” In Proceedings of the IEEE International Conference on Electronics Circuits and Systems, pp 1175–1178, 2010.

    Google Scholar 

  10. R. Chakraborty and S. Bhunia, “Security against Hardware Trojan through a Novel Application of Design Obfuscation,” IEEE/ACM Int. Conf. on Computer-Aided Design (ICCAD), pp. 113–116, 2009.

    Google Scholar 

  11. http://eda-automation.blogspot.com/2010/06/filler-cells.html.

  12. N. Weste and D. Harris, “CMOS VLSI Design: A Circuits and Systems Perspective,” 4th edition, Addison-Wesley, 2010.

    Google Scholar 

  13. Synopsys Inc., “Synopsys 90nm Generic Library for Teaching IC Design,” University program.

    Google Scholar 

  14. Synopsys Inc., “IC Compiler, The next-generation physical design system,” Synopsys Datasheet, 2010.

    Google Scholar 

  15. C. Yeh and M. Marek-Sadowska, “Timing-aware power noise reduction in placement,” IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, Vol. 26, Issue 3, pp. 527–541, 2007.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Tehranipoor, M., Salmani, H., Zhang, X. (2014). Trojan Prevention: Built-In Self-Authentication. In: Integrated Circuit Authentication. Springer, Cham. https://doi.org/10.1007/978-3-319-00816-5_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-00816-5_8

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-00815-8

  • Online ISBN: 978-3-319-00816-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics