On the Difficulty of Inserting Trojans in Reversible Computing Architectures

被引:8
|
作者
Cui, Xiaotong [1 ,2 ]
Saeed, Samah Mohamed [3 ]
Zulehner, Alwin [4 ]
Wille, Robert [4 ]
Wu, Kaijie [5 ]
Drechsler, Rolf [7 ,8 ]
Karri, Ramesh [6 ]
机构
[1] Chongqing Univ Posts & Telecommun, Sch Cyber Secur & Informat Law, Chongqing 400065, Peoples R China
[2] Chongqing Univ, Coll Comp Sci, Comp Sci & Technol, Chongqing 400044, Peoples R China
[3] Univ Washington, Inst Technol, Comp Engn, Tacoma, WA 98195 USA
[4] Johannes Kepler Univ Linz, Inst Integrated Circuits, A-4040 Linz, Austria
[5] NYU, Tandon Sch Engn, 550 1St Ave, New York, NY 10003 USA
[6] NYU, Tandon Sch Engn, Elect & Comp Engn, 550 1St Ave, New York, NY 10003 USA
[7] Univ Bremen, Grp Comp Architecture, Inst Comp Sci, D-28359 Bremen, Germany
[8] DFKI GmbH, D-28359 Bremen, Germany
基金
美国国家科学基金会;
关键词
Trojan horses; Hardware; Logic gates; Security; Foundries; Integrated circuits; Adders; Hardware Trojans; design for trust; reversible circuits; scrambling; ancillary inputs; LOGIC; ALGORITHM;
D O I
10.1109/TETC.2018.2823315
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Fabrication-less design houses outsource their designs to third-party foundries to lower fabrication cost. However, this creates opportunities for a rogue in the semiconductor foundry to introduce hardware Trojans, which stay inactive most of the time and cause unintended consequences to the system when triggered. Hardware Trojans in traditional CMOS-based circuits have been studied, and Design-for-Trust (DFT) techniques have been proposed to detect them. Different from traditional circuits in many ways, reversible circuits implement one-to-one input/output mappings. In this paper, we investigate the security implications of reversible circuits with a particular focus on the susceptibility to hardware Trojans. To this end, we consider reversible functions implemented using reversible circuits as well as irreversible functions embedded in reversible circuits.
引用
收藏
页码:960 / 972
页数:13
相关论文
共 50 条
  • [1] Predictors of difficulty inserting the female condom
    Artz, L
    Demand, M
    Pulley, L
    Posner, SF
    Macaluso, M
    CONTRACEPTION, 2002, 65 (02) : 151 - 157
  • [2] DIFFICULTY IN INSERTING A LARYNGEAL MASK AIRWAY
    EVANS, A
    ANAESTHESIA, 1995, 50 (05) : 468 - 469
  • [3] Hardware Trojans in Reconfigurable Computing
    Ahmed, Qazi Arbab
    PROCEEDINGS OF THE 2021 IFIP/IEEE INTERNATIONAL CONFERENCE ON VERY LARGE SCALE INTEGRATION (VLSI-SOC), 2021, : 182 - 183
  • [4] Run-Time Effect by Inserting Hardware Trojans, in Combinational Circuits
    Kounelis, Fotios
    Sklavos, Nicolas
    Kitsos, Paris
    2017 EUROMICRO CONFERENCE ON DIGITAL SYSTEM DESIGN (DSD), 2017, : 287 - 290
  • [5] An unusual cause of difficulty inserting a nasogastric tube
    Banda, Clever
    Gibb, Charlotte E.
    Smith, Carina O.
    JOURNAL OF PAEDIATRICS AND CHILD HEALTH, 2017, 53 (02) : 197 - +
  • [6] Run-Time Effect by Inserting Hardware Trojans, in Combinational Circuits
    2017, Institute of Electrical and Electronics Engineers Inc., United States
  • [7] Securing Photonic NoC Architectures from Hardware Trojans
    Pasricha, Sudeep
    Chittamuru, Sai Vineel Reddy
    Thakkar, Ishan G.
    Bhat, Varun
    2018 TWELFTH IEEE/ACM INTERNATIONAL SYMPOSIUM ON NETWORKS-ON-CHIP (NOCS), 2018,
  • [8] Mitigation of Denial of Service Attack with Hardware Trojans in NoC Architectures
    Boraten, Travis
    Kodi, Avinash Karanth
    2016 IEEE 30TH INTERNATIONAL PARALLEL AND DISTRIBUTED PROCESSING SYMPOSIUM (IPDPS 2016), 2016, : 1091 - 1100
  • [9] A Study on the Effect of Hardware Trojans in the Performance of Network on Chip Architectures
    SCMS School of Engineering and Technology, Department of Computer Science and Engineering, Ernakulam, India
    Int. Conf. Smart Comput. Commun.: Artif. Intell. (AI) Driven Appl. Smart World, ICSCC, 1600, (314-318):
  • [10] A Novel Built-In Self-Authentication Technique to Prevent Inserting Hardware Trojans
    Xiao, Kan
    Forte, Domenic
    Tehranipoor, Mohammed
    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2014, 33 (12) : 1778 - 1791