TY - GEN
T1 - Design and analysis of ring oscillator based Design-for-Trust technique
AU - Rajendran, Jeyavijayan
AU - Jyothi, Vinayaka
AU - Sinanoglu, Ozgur
AU - Karri, Ramesh
PY - 2011
Y1 - 2011
N2 - Due to the increasing opportunities for malicious inclusions in hardware, Design-for-Trust (DFTr) is emerging as an important IC design methodology. In order to incorporate the DFTr techniques into the IC development cycle, they have to be practical in terms of their Trojan detection capabilities, hardware overhead, and test cost. We propose a non-invasive DFTr technique, which can detect Trojans in the presence of process variations and measurement errors. This technique can detect Trojans that are inserted in all or a subset of the ICs. It is applicable to both ASICs and FPGA implementations. Circuit paths in a design are reconfigured into ring oscillators1 (ROs) by adding a small amount of logic. Trojans are detected by observing the changes in the frequency of the ROs. An algorithm is provided to secure all the gates, while reducing the hardware overhead. We analyzed the coverage, area and test time overhead of the proposed DFTr technique. To demonstrate its effectiveness in the real world, the proposed technique had been validated by a red-team blue-team approach.
AB - Due to the increasing opportunities for malicious inclusions in hardware, Design-for-Trust (DFTr) is emerging as an important IC design methodology. In order to incorporate the DFTr techniques into the IC development cycle, they have to be practical in terms of their Trojan detection capabilities, hardware overhead, and test cost. We propose a non-invasive DFTr technique, which can detect Trojans in the presence of process variations and measurement errors. This technique can detect Trojans that are inserted in all or a subset of the ICs. It is applicable to both ASICs and FPGA implementations. Circuit paths in a design are reconfigured into ring oscillators1 (ROs) by adding a small amount of logic. Trojans are detected by observing the changes in the frequency of the ROs. An algorithm is provided to secure all the gates, while reducing the hardware overhead. We analyzed the coverage, area and test time overhead of the proposed DFTr technique. To demonstrate its effectiveness in the real world, the proposed technique had been validated by a red-team blue-team approach.
UR - http://www.scopus.com/inward/record.url?scp=79959669568&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=79959669568&partnerID=8YFLogxK
U2 - 10.1109/VTS.2011.5783766
DO - 10.1109/VTS.2011.5783766
M3 - Conference contribution
AN - SCOPUS:79959669568
SN - 9781612846552
T3 - Proceedings of the IEEE VLSI Test Symposium
SP - 105
EP - 110
BT - Proceedings - 2011 29th IEEE VLSI Test Symposium, VTS 2011
T2 - 2011 29th IEEE VLSI Test Symposium, VTS 2011
Y2 - 1 May 2011 through 5 May 2011
ER -