Applying TMR for Trojan Masking: Challenges, Guidelines and New Solutions

سال انتشار: 1400
نوع سند: مقاله کنفرانسی
زبان: انگلیسی
مشاهده: 178

فایل این مقاله در 17 صفحه با فرمت PDF قابل دریافت می باشد

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این مقاله:

شناسه ملی سند علمی:

CSCCI01_019

تاریخ نمایه سازی: 26 اردیبهشت 1401

چکیده مقاله:

Hardware Trojans are among the most critical threats to the security and trustworthiness of computing systems. To protect circuits against Trojans, many detection methods and design-for-hardware-trust techniques are provided in the literature, including triple modular redundancy (TMR). However, most available TMR techniques can be easily neutralized if the Trojan is implemented at the output of the voting module. We previously introduced OTMR (TMR with obfuscated voter) to overcome this challenge. In this paper, we present a more thorough discussion on the limitations and challenges of applying TMR for Trojan masking. We highlight the importance of controlling TMR overhead to keep the Trojan-to-background effect ratio as large as possible. We also provide algorithms for the effective application of OTMR on low-observable, low-controllable and functionally-critical signals. We conducted experiments on general and crypto benchmarks to validate the effectiveness of our approach. The result confirms that, if wisely used, OTMR can mask Trojans and improve the Trojan detection probability by side-channel analysis at the same time.

کلیدواژه ها:

نویسندگان

Seyed Mohammadhossein Shekarian,

Factually of Engineering, Department of Computer Engineering, University of Guilan, Rasht, Iran

Arman Hajishafieha,

Factually of Engineering, Department of Computer Engineering, University of Guilan, Rasht, Iran