Abstract
Trustworthiness of system-on-chip designs is undermined by malicious logic (Trojans) in third-party intellectual properties (3PIPs). In this paper, duplication, diversity, and isolation principles have been extended to detect build trustworthy systems using untrusted, potentially Trojan-infected 3PIPs. We use a diverse set of vendors to prevent collusions between the 3PIPs from the same vendor. We identify design constraints for Trojan detection to achieving detection, collusion prevention, and isolating the Trojan-infected 3PIP, and incorporate them during high-level synthesis. In addition, we develop techniques to reduce the number of vendors. The effectiveness of the proposed techniques is validated using the high-level synthesis benchmarks.
Original language | English (US) |
---|---|
Article number | 7450679 |
Pages (from-to) | 2946-2959 |
Number of pages | 14 |
Journal | IEEE Transactions on Very Large Scale Integration (VLSI) Systems |
Volume | 24 |
Issue number | 9 |
DOIs | |
State | Published - Sep 2016 |
Keywords
- Diversity
- Trojan detection
- hardware security
- high-level synthesis
- scheduling
ASJC Scopus subject areas
- Software
- Hardware and Architecture
- Electrical and Electronic Engineering