Building Trustworthy Systems Using Untrusted Components: A High-Level Synthesis Approach

Jeyavijayan J.V. Rajendran, Ozgur Sinanoglu, Ramesh Karri

Research output: Contribution to journalArticlepeer-review

Abstract

Trustworthiness of system-on-chip designs is undermined by malicious logic (Trojans) in third-party intellectual properties (3PIPs). In this paper, duplication, diversity, and isolation principles have been extended to detect build trustworthy systems using untrusted, potentially Trojan-infected 3PIPs. We use a diverse set of vendors to prevent collusions between the 3PIPs from the same vendor. We identify design constraints for Trojan detection to achieving detection, collusion prevention, and isolating the Trojan-infected 3PIP, and incorporate them during high-level synthesis. In addition, we develop techniques to reduce the number of vendors. The effectiveness of the proposed techniques is validated using the high-level synthesis benchmarks.

Original languageEnglish (US)
Article number7450679
Pages (from-to)2946-2959
Number of pages14
JournalIEEE Transactions on Very Large Scale Integration (VLSI) Systems
Volume24
Issue number9
DOIs
StatePublished - Sep 2016

Keywords

  • Diversity
  • Trojan detection
  • hardware security
  • high-level synthesis
  • scheduling

ASJC Scopus subject areas

  • Software
  • Hardware and Architecture
  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'Building Trustworthy Systems Using Untrusted Components: A High-Level Synthesis Approach'. Together they form a unique fingerprint.

Cite this