On the Difficulty of Inserting Trojans in Reversible Computing Architectures

被引:8
|
作者
Cui, Xiaotong [1 ,2 ]
Saeed, Samah Mohamed [3 ]
Zulehner, Alwin [4 ]
Wille, Robert [4 ]
Wu, Kaijie [5 ]
Drechsler, Rolf [7 ,8 ]
Karri, Ramesh [6 ]
机构
[1] Chongqing Univ Posts & Telecommun, Sch Cyber Secur & Informat Law, Chongqing 400065, Peoples R China
[2] Chongqing Univ, Coll Comp Sci, Comp Sci & Technol, Chongqing 400044, Peoples R China
[3] Univ Washington, Inst Technol, Comp Engn, Tacoma, WA 98195 USA
[4] Johannes Kepler Univ Linz, Inst Integrated Circuits, A-4040 Linz, Austria
[5] NYU, Tandon Sch Engn, 550 1St Ave, New York, NY 10003 USA
[6] NYU, Tandon Sch Engn, Elect & Comp Engn, 550 1St Ave, New York, NY 10003 USA
[7] Univ Bremen, Grp Comp Architecture, Inst Comp Sci, D-28359 Bremen, Germany
[8] DFKI GmbH, D-28359 Bremen, Germany
基金
美国国家科学基金会;
关键词
Trojan horses; Hardware; Logic gates; Security; Foundries; Integrated circuits; Adders; Hardware Trojans; design for trust; reversible circuits; scrambling; ancillary inputs; LOGIC; ALGORITHM;
D O I
10.1109/TETC.2018.2823315
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Fabrication-less design houses outsource their designs to third-party foundries to lower fabrication cost. However, this creates opportunities for a rogue in the semiconductor foundry to introduce hardware Trojans, which stay inactive most of the time and cause unintended consequences to the system when triggered. Hardware Trojans in traditional CMOS-based circuits have been studied, and Design-for-Trust (DFT) techniques have been proposed to detect them. Different from traditional circuits in many ways, reversible circuits implement one-to-one input/output mappings. In this paper, we investigate the security implications of reversible circuits with a particular focus on the susceptibility to hardware Trojans. To this end, we consider reversible functions implemented using reversible circuits as well as irreversible functions embedded in reversible circuits.
引用
收藏
页码:960 / 972
页数:13
相关论文
共 50 条
  • [41] An APT Trojans Detection Method for Cloud Computing Based on Memory Analysis and FCM
    Ge, Liang
    Wang, Lianhai
    Xu, Lijuan
    2016 3RD INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND CONTROL ENGINEERING (ICISCE), 2016, : 179 - 183
  • [42] MAKING REVERSIBLE COMPUTING MACHINES IN A REVERSIBLE CELLULAR SPACE
    Morita, Kenichi
    BULLETIN OF THE EUROPEAN ASSOCIATION FOR THEORETICAL COMPUTER SCIENCE, 2023, 2023 (140): : 40 - 76
  • [43] An APT Trojans Detection Method for Cloud Computing Based on Memory Analysis and FCM
    Ge, Liang
    Wang, Lianhai
    Xu, Lijuan
    Proceedings - 2016 3rd International Conference on Information Science and Control Engineering, ICISCE 2016, 2016, : 179 - 183
  • [44] Foundations of Generalized Reversible Computing
    Frank, Michael P.
    REVERSIBLE COMPUTATION, RC 2017, 2017, 10301 : 19 - 34
  • [45] Analysis of Faults in Reversible Computing
    Lukac, Martin
    Kameyama, Michitaka
    Perkowski, Marek
    Kerntopf, Pawel
    Moraga, Claudio
    2014 IEEE 44TH INTERNATIONAL SYMPOSIUM ON MULTIPLE-VALUED LOGIC (ISMVL 2014), 2014, : 115 - 120
  • [46] CORBA and DCOM: Architectures for distributed computing
    Watkins, Damien
    Proceedings of the Conference on Technology of Object-Oriented Languages and Systems, TOOLS, 1999,
  • [47] OPTICAL COMPUTING ARCHITECTURES AND LOGIC UNITS
    WHERRETT, BS
    JOURNAL DE PHYSIQUE, 1988, 49 (C-2): : 29 - 34
  • [48] Systolic architectures for soft computing algorithms
    Bilski, J
    Smolag, J
    Zurada, J
    PARALLEL PROCESSING AND APPLIED MATHEMATICS, 2004, 3019 : 601 - 608
  • [49] Fundamentals of reversible logic and computing
    Perkowski, M
    Kerntopf, P
    EUROMICRO SYMPOSIUM ON DIGITAL SYSTEMS DESIGN, PROCEEDINGS, 2001, : 244 - 244
  • [50] Architectures for reliable computing with unreliable nanodevices
    Nikolic, K
    Sadek, A
    Forshaw, M
    PROCEEDINGS OF THE 2001 1ST IEEE CONFERENCE ON NANOTECHNOLOGY, 2001, : 254 - 259