Volume 9, Issue 31 (5-2019)                   فصلنامه فناوری اطلاعات 2019, 9(31): 13-32 | Back to browse issues page

XML Persian Abstract Print


Download citation:
BibTeX | RIS | EndNote | Medlars | ProCite | Reference Manager | RefWorks
Send citation to:

hajimohseni S, doostari M, ghaznavi ghoushchi M. Hardwar Trojan classification and implementation and offer a new detection approach. فصلنامه فناوری اطلاعات. 2019; 9 (31) :13-32
URL: http://jor.iranaict.ir/article-1-176-en.html
Shahed University
Abstract:   (777 Views)
A hardware attack that enables the attacker to alter the main circuit with malicious hardware during either design or the fabrication process is studied and analyzed. This attack, known as the hardware Trojan, has different objectives such as destroying hardware, changing circuit characteristics or extracting sensitive information. So hardware Trojan detection and hardware security are critical issues. First, we categorize the Trojans and Trojan detection methods and then implement four types of Trojan on DES algorithm. Then a hardware approach to the detection of hardware Trojans based on the characteristics of circuit delay is proposed. In this approach, ring oscillator frequencies are inputs of the circuit under test, and output is a string of bits corresponding to challenges. The proposed hardware is designed to address any changes in the main circuit that would affect the frequency of the ring oscillator factors, such as temperature, voltage, and process variations that influence the frequency of the ring oscillator are analyzed, and a suitable ring oscillator is recommended for embedding into the circuit. As a result, the frequency variation will be reduced dramatically, and it can be determined with higher certainty whether changes in frequency are result of a possible Trojan.As a result the output bit string, which is now unaffected by frequency changes due to process variation, can be used as a measure to detect hardware Trojans.
Full-Text [PDF 927 kb]   (228 Downloads)    
Type of Study: Applicable | Subject: ICT
Received: 2013/01/2 | Accepted: 2019/05/21 | Published: 2019/05/21

Add your comments about this article : Your username or Email:
CAPTCHA

Send email to the article author


© 2024 All Rights Reserved |

Designed & Developed by : Yektaweb