Document Type
Article
Publication Date
6-22-2016
Publication Title
IEEE Transactions on Multi-Scale Computing Systems
Abstract
Field programmable gate arrays (FPGAs) are being increasingly used in a wide range of critical applications, including industrial, automotive, medical, and military systems. Since FPGA vendors are typically fabless, it is more economical to outsource device production to off-shore facilities. This introduces many opportunities for the insertion of malicious alterations of FPGA devices in the foundry, referred to as hardware Trojan attacks, that can cause logical and physical malfunctions during field operation. The vulnerability of these devices to hardware attacks raises serious security concerns regarding hardware and design assurance. In this paper, we present a taxonomy of FPGA-specific hardware Trojan attacks based on activation and payload characteristics along with Trojan models that can be inserted by an attacker. We also present an efficient Trojan detection method for FPGA based on a combined approach of logic-testing and side-channel analysis. Finally, we propose a novel design approach, referred to as Adapted Triple Modular Redundancy (ATMR), to reliably protect against Trojan circuits of varying forms in FPGA devices. We compare ATMR with the conventional TMR approach. The results demonstrate the advantages of ATMR over TMR with respect to power overhead, while maintaining the same or higher level of security and performances as TMR. Further improvement in overhead associated with ATMR is achieved by exploiting reconfiguration and time-sharing of resources.
Repository Citation
Mal-Sarkar, Sanchita; Karam, Robert; Narasimhan, Seetharam; Ghosh, Anandaroop; Krishna, Aswin; and Bhunia, Swarup, "Design and Validation for FPGA Trust under Hardware Trojan Attacks" (2016). Electrical and Computer Engineering Faculty Publications. 411.
https://engagedscholarship.csuohio.edu/enece_facpub/411
DOI
10.1109/TMSCS.2016.2584052
Version
Postprint
Publisher's Statement
(c) 2016 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information. This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication.
Volume
2
Issue
3
Comments
This work is funded in part by US National Science Foundation (NSF) grants 1603475, 1603483, and 1603480.