{"title":"An Effective Application of Obfuscated TMR to Tackle Hardware Trojans","authors":"Masoume Mehdinia Siboni, Seyed Mohammadhossein Shekarian","doi":"10.1109/ICCKE48569.2019.8964879","DOIUrl":null,"url":null,"abstract":"Redundancy-based techniques are used in the literature to neutralize the effects of hardware Trojan horses (HTHs). However, the available techniques assume that HTHs cannot be inserted into the replicated logic, without introducing recognizable changes in the side effects of the circuit. In this paper, we discuss the limitations of this assumption. We demonstrate that fault-tolerant techniques should be enhanced by obfuscation methods to be actually effective, and we propose a novel obfuscated TMR (Triple Modular Redundancy) to prove the concept. We evaluated the effectiveness of our approach on ISCAS benchmarks. The results show that Trojans would incur about 18% higher detection risk in average, if attackers try to deceive the obfuscated TMR.","PeriodicalId":6685,"journal":{"name":"2019 9th International Conference on Computer and Knowledge Engineering (ICCKE)","volume":"25 1","pages":"12-17"},"PeriodicalIF":0.0000,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 9th International Conference on Computer and Knowledge Engineering (ICCKE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCKE48569.2019.8964879","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
Redundancy-based techniques are used in the literature to neutralize the effects of hardware Trojan horses (HTHs). However, the available techniques assume that HTHs cannot be inserted into the replicated logic, without introducing recognizable changes in the side effects of the circuit. In this paper, we discuss the limitations of this assumption. We demonstrate that fault-tolerant techniques should be enhanced by obfuscation methods to be actually effective, and we propose a novel obfuscated TMR (Triple Modular Redundancy) to prove the concept. We evaluated the effectiveness of our approach on ISCAS benchmarks. The results show that Trojans would incur about 18% higher detection risk in average, if attackers try to deceive the obfuscated TMR.