Hardware patching methodology for neutralizing timing hardware Trojans using vulnerability analysis and time borrowing scheme

F Khormizi, A Shabani… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
F Khormizi, A Shabani, B Alizadeh
IEEE Transactions on Circuits and Systems II: Express Briefs, 2022ieeexplore.ieee.org
Outsourcing of the design and IC fabrication to the untrusted entities increases the risk of
hardware Trojan insertion in different stages of IC's life cycle. In this brief, we propose a pre-
silicon modification scheme, aiming at detecting and compensating the adverse effect of
timing hardware Trojans (THT) using a time borrowing approach. The key idea is that a
circuit path under tamper in which the setup time is violated can borrow some time from the
following stage if it has enough positive timing slack to donate. Accordingly, we modify the …
Outsourcing of the design and IC fabrication to the untrusted entities increases the risk of hardware Trojan insertion in different stages of IC’s life cycle. In this brief, we propose a pre-silicon modification scheme, aiming at detecting and compensating the adverse effect of timing hardware Trojans (THT) using a time borrowing approach. The key idea is that a circuit path under tamper in which the setup time is violated can borrow some time from the following stage if it has enough positive timing slack to donate. Accordingly, we modify the original circuit by employing the Dynamic flip-flop Conversion (DFFC) structures to convert the suspected flip-flops into a single transparent latch. A new timing vulnerability analysis including the path-delay and structural analysis along with the proposed test pattern generation scheme is also developed to exploit the vulnerable paths suitable for DFFC insertion. The experimental results show that the insertion of DFFC structures can effectively predict timing errors higher than 1.4% of the critical path-delay while it can fully restore the Trojan-infected paths back to its normal state by compensating 100% of the injected delays ranging from 39% to 81% of the critical path.
ieeexplore.ieee.org
以上显示的是最相近的搜索结果。 查看全部搜索结果