Many fabless semiconductor companies outsource their designs to third-party fabrication houses. As trustworthiness of chain after outsourcing including fabrication houses is not established, any adversary in between, with malicious intent may tamper the design by inserting Hardware Trojans (HTs). Detection of such HTs is of utmost importance to assure the trust and integrity of the chips. However, the efficiency of detection techniques based on side-channel analysis is largely affected by process variations. In this paper, a methodology for detecting HTs by analyzing the delays of topologically symmetric paths is proposed. The proposed technique, rather than depending on golden ICs as a reference for HT detection, employs the concept of self-referencing. In this work, the fact that delays of topologically symmetric paths in an IC will be affected similarly by process variations is exploited. A procedure to chose topologically symmetric paths that are minimally affected by process variations is presented. Further, a technique is proposed to create topologically symmetric paths by inserting extra logic gates if such paths do not exist in the design intrinsically. Simulations performed on ISCAS-85 benchmarks establish that the proposed method is able to achieve a true positive rate of 100% with a false positive rate less than 3%. In our experimentation, We have considered the maximum of 15% intra-die and 20% inter-die variations in threshold voltage (Vth).
翻译:许多假体将半导体公司的设计外包给第三方制造厂。由于外包后链条包括制造厂房的可信度尚未确立,因此,在包括制造厂房在内的外包后链条中,恶意意图之间的任何对手都有可能通过插入硬质软件Trojans(HTs)来破坏设计。检测这种HTs对于确保芯片的信任和完整性至关重要。然而,基于侧道分析的检测技术的效率在很大程度上受到过程变异的影响。在本文件中,提出了通过分析地形对称路径的延误来检测HT的方法。拟议的技术,而不是以金性ICs作为HT检测的参照标准,而是采用自我参照概念的概念。在这项工作中,对IC的表性对称路径的延迟将受到类似过程变异的影响。提出了选择最轻微受过程变异影响的表性对称路径的程序。此外,还提议了一种技术,通过插入额外的逻辑门来创建表性对称路径,如果在设计中不存在这种路径的话,则使用金性ICS-85标准,则采用自我参照的自我参照概念。在设计中,以100比标准进行最慢的模型,在ISC-85的正确率上,我们采用最差率为最差率为最低的ISCAS-85的方法将达到正确的比率。