Abstract
With the advent of globalization in the fabrication of IC (integrated circuits) industry, the threat of Hardware Trojan (HT) has increased. The malevolent HT inserted at unused resources and the user is unaware. We proposed a technique, i.e., the combination of modified BISA (Built In Self Authentication) and AES (Advance Encryption Standard) to protect the system from HT hazard. In modified BISA, the unused resources pins are filled with the dummy functional logic. Then the encryption is done by AES algorithm, the code is decrypted with the key that is known only to user. The proposed technique is implemented on Xilinx 10.1_ISE in family Automatic Sparton3 and device XA3S50. The scheme reduces the probability of HT insertion and performance remains same as of original circuitry.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Li, H., Liu, Q., Zhang, J.: A survey of hardware Trojan threat and defence. Int. VLSI J. 55, 426–437 (2016)
Xiao, K., Tehranipoor, M.: BISA: Built-in self-authentication for preventing hardware Trojan insertion. In: 2013 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), Austin, TX pp. 45–50 (2013)
Lamech, C., Rad, R.M., Tehranipoor, M., Plus quellic, J.: An experimental analysis of power and delay signal-to-noise requirements for detecting Trojans and methods for achieving the required detection sensitivities. IEEE Trans. Inf. Forensics Secur. 3, 1170–1179 (2011)
Rithesh, M., et al. Detection and analysis of hardware trojan using scan chain method. In: 19th International Symposium on VLSI Design and Test (VDAT). IEEE (2015)
Wei, S., Potkonjak, M.: Self-consistency and consistency-based detection and diagnosis of malicious circuitry. IEEE Trans. VLSI Systems 22, 1845–1853 (2014)
Seyed Mohammad Hossein, S., Morteza Saheb Zamani. Improving hardware Trojan detection by retiming. Microprocess. Microsyst. 39 145–156 (2015)
Khaleghi, B., et al.: Fpga-based protection scheme against hardware trojan horse insertion using dummy logic. IEEE Embed. Syst. Lett. 7 46–50 (2015)
Sanchita, M.-S., et al.: Hardware trojan attacks in fpga devices: threat analysis and effective counter measures. In: Proceedings of the 24th Edition of the Great Lakes Symposium on VLSI ACM, pp. 287–292 (2014)
Nandeesha, V., Schafer, B.: Hardware trojan detection in behavioral intellectual properties (ips) using property checking techniques. IEEE Trans. Emerg. Top. Comput. (2016)
Ziad, S., Tarek Ibn, M., et al.: Homomorphic data isolation for hardware trojan protection. In: 2015 IEEE Computer Society Annual Symposium on VLSI. IEEE (2015)
Samer, M., et al.: Classification of hardware trojan detection techniques. In: Tenth International Conference on Computer Engineering and Systems (ICCES). IEEE (2015)
Stallings, W.: Cryptography Netw. Secur., 3rd edn. Pearson, Boston (2017)
Tehranipoor, M., Karri, R., Koushanfar, F., Potkonjak, M.: TrustHub. https://www.trust-hub
Albrecht, C.: Iwls 2005 benchmarks. In: International on Workshop for Logic Synthesis (IWLS) (2005). http://www.iwls.org
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Brar, N.K., Dhindsa, A., Agrawal, S. (2019). Prevention of Hardware Trojan by Reducing Unused Pins and AES in FPGA. In: Sa, P., Bakshi, S., Hatzilygeroudis, I., Sahoo, M. (eds) Recent Findings in Intelligent Computing Techniques . Advances in Intelligent Systems and Computing, vol 707. Springer, Singapore. https://doi.org/10.1007/978-981-10-8639-7_11
Download citation
DOI: https://doi.org/10.1007/978-981-10-8639-7_11
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-8638-0
Online ISBN: 978-981-10-8639-7
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)