TY - JOUR
T1 - Building Trustworthy Systems Using Untrusted Components
T2 - A High-Level Synthesis Approach
AU - Rajendran, Jeyavijayan J.V.
AU - Sinanoglu, Ozgur
AU - Karri, Ramesh
N1 - Funding Information:
This work was supported in part by the Cyber Security Center, New York University, in part by the CSC-Abu Dhabi, in part by the U.S. National Science Foundation (Grant No. 1526405). The work of O. Sinanoglu is supported in part by the Semiconductor Research Corporation, in part by Mubadala Technology, and in part by the U.S. National Science Foundation.
Publisher Copyright:
© 2016 IEEE.
PY - 2016/9
Y1 - 2016/9
N2 - Trustworthiness of system-on-chip designs is undermined by malicious logic (Trojans) in third-party intellectual properties (3PIPs). In this paper, duplication, diversity, and isolation principles have been extended to detect build trustworthy systems using untrusted, potentially Trojan-infected 3PIPs. We use a diverse set of vendors to prevent collusions between the 3PIPs from the same vendor. We identify design constraints for Trojan detection to achieving detection, collusion prevention, and isolating the Trojan-infected 3PIP, and incorporate them during high-level synthesis. In addition, we develop techniques to reduce the number of vendors. The effectiveness of the proposed techniques is validated using the high-level synthesis benchmarks.
AB - Trustworthiness of system-on-chip designs is undermined by malicious logic (Trojans) in third-party intellectual properties (3PIPs). In this paper, duplication, diversity, and isolation principles have been extended to detect build trustworthy systems using untrusted, potentially Trojan-infected 3PIPs. We use a diverse set of vendors to prevent collusions between the 3PIPs from the same vendor. We identify design constraints for Trojan detection to achieving detection, collusion prevention, and isolating the Trojan-infected 3PIP, and incorporate them during high-level synthesis. In addition, we develop techniques to reduce the number of vendors. The effectiveness of the proposed techniques is validated using the high-level synthesis benchmarks.
KW - Diversity
KW - Trojan detection
KW - hardware security
KW - high-level synthesis
KW - scheduling
UR - http://www.scopus.com/inward/record.url?scp=84963542529&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84963542529&partnerID=8YFLogxK
U2 - 10.1109/TVLSI.2016.2530092
DO - 10.1109/TVLSI.2016.2530092
M3 - Article
AN - SCOPUS:84963542529
SN - 1063-8210
VL - 24
SP - 2946
EP - 2959
JO - IEEE Transactions on Very Large Scale Integration (VLSI) Systems
JF - IEEE Transactions on Very Large Scale Integration (VLSI) Systems
IS - 9
M1 - 7450679
ER -