On the Difficulty of Inserting Trojans in Reversible Computing Architectures

被引:8
|
作者
Cui, Xiaotong [1 ,2 ]
Saeed, Samah Mohamed [3 ]
Zulehner, Alwin [4 ]
Wille, Robert [4 ]
Wu, Kaijie [5 ]
Drechsler, Rolf [7 ,8 ]
Karri, Ramesh [6 ]
机构
[1] Chongqing Univ Posts & Telecommun, Sch Cyber Secur & Informat Law, Chongqing 400065, Peoples R China
[2] Chongqing Univ, Coll Comp Sci, Comp Sci & Technol, Chongqing 400044, Peoples R China
[3] Univ Washington, Inst Technol, Comp Engn, Tacoma, WA 98195 USA
[4] Johannes Kepler Univ Linz, Inst Integrated Circuits, A-4040 Linz, Austria
[5] NYU, Tandon Sch Engn, 550 1St Ave, New York, NY 10003 USA
[6] NYU, Tandon Sch Engn, Elect & Comp Engn, 550 1St Ave, New York, NY 10003 USA
[7] Univ Bremen, Grp Comp Architecture, Inst Comp Sci, D-28359 Bremen, Germany
[8] DFKI GmbH, D-28359 Bremen, Germany
基金
美国国家科学基金会;
关键词
Trojan horses; Hardware; Logic gates; Security; Foundries; Integrated circuits; Adders; Hardware Trojans; design for trust; reversible circuits; scrambling; ancillary inputs; LOGIC; ALGORITHM;
D O I
10.1109/TETC.2018.2823315
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Fabrication-less design houses outsource their designs to third-party foundries to lower fabrication cost. However, this creates opportunities for a rogue in the semiconductor foundry to introduce hardware Trojans, which stay inactive most of the time and cause unintended consequences to the system when triggered. Hardware Trojans in traditional CMOS-based circuits have been studied, and Design-for-Trust (DFT) techniques have been proposed to detect them. Different from traditional circuits in many ways, reversible circuits implement one-to-one input/output mappings. In this paper, we investigate the security implications of reversible circuits with a particular focus on the susceptibility to hardware Trojans. To this end, we consider reversible functions implemented using reversible circuits as well as irreversible functions embedded in reversible circuits.
引用
收藏
页码:960 / 972
页数:13
相关论文
共 50 条
  • [21] DRMaSV: Enhanced Capability Against Hardware Trojans in Coarse Grained Reconfigurable Architectures
    Liu, Leibo
    Zhou, Zhuoquan
    Wei, Shaojun
    Zhu, Min
    Yin, Shouyi
    Mao, Shengyang
    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2018, 37 (04) : 782 - 795
  • [22] Reversible photocontrol of oxidase activity by inserting a photosensitive domain into the oxidase
    Tongjing Sun
    Baoqi Zhang
    Jinping Lin
    Yuhong Ren
    Bioresources and Bioprocessing, 6
  • [23] Hiatal Hernia Presenting as Difficulty in Inserting Feeding Tube in a Neonate Born Preterm
    Joghee, Sunil
    Soraisham, Amuchou Singh
    JOURNAL OF PEDIATRICS, 2020, 218 : 256 - +
  • [24] Computational Difficulty of Computing the Density of States
    Brown, Brielin
    Flammia, Steven T.
    Schuch, Norbert
    PHYSICAL REVIEW LETTERS, 2011, 107 (04)
  • [25] REVERSIBLE AND ENDOREVERSIBLE COMPUTING
    DEVOS, A
    INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 1995, 34 (11) : 2251 - 2266
  • [26] Reversible photocontrol of oxidase activity by inserting a photosensitive domain into the oxidase
    Sun, Tongjing
    Zhang, Baoqi
    Lin, Jinping
    Ren, Yuhong
    BIORESOURCES AND BIOPROCESSING, 2019, 6 (01)
  • [27] Reversible stochastic computing
    Khanday, Farooq A.
    Akhtar, Romisa
    INTERNATIONAL JOURNAL OF NUMERICAL MODELLING-ELECTRONIC NETWORKS DEVICES AND FIELDS, 2020, 33 (04)
  • [28] Reversible Monadic Computing
    Heunen, Chris
    Karvonen, Martti
    ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2015, 319 : 217 - 237
  • [29] NEUROMOLECULAR COMPUTING - MECHANISMS AND ARCHITECTURES
    CONRAD, M
    PROCEEDINGS OF THE ANNUAL INTERNATIONAL CONFERENCE OF THE IEEE ENGINEERING IN MEDICINE AND BIOLOGY SOCIETY, PTS 1-4, 1988, : 1015 - 1016
  • [30] Opportunistic Computing in GPU Architectures
    Pattnaik, Ashutosh
    Tang, Xulong
    Kayiran, Onur
    Jog, Adwait
    Mishra, Asit K.
    Kandemir, Mahmut T.
    Sivasubramaniam, Anand
    Das, Chita R.
    PROCEEDINGS OF THE 2019 46TH INTERNATIONAL SYMPOSIUM ON COMPUTER ARCHITECTURE (ISCA '19), 2019, : 210 - 223