On the Difficulty of Inserting Trojans in Reversible Computing Architectures

Xiaotong Cui, Samah Mohamed Saeed, Alwin Zulehner, Robert Wille, Kaijie Wu, Rolf Drechsler, Ramesh Karri

Research output: Contribution to journalArticle

Abstract

Fabrication-less design houses outsource their designs to third-party foundries to lower fabrication cost. However, this creates opportunities for a rogue in the semiconductor foundry to introduce hardware Trojans, which stay inactive most of the time and cause unintended consequences to the system when triggered. Hardware Trojans in traditional CMOSbased circuits have been studied, and Design-for-Trust (DFT) techniques have been proposed to detect them.

Original languageEnglish (US)
JournalIEEE Transactions on Emerging Topics in Computing
DOIs
StateAccepted/In press - Apr 4 2018

Fingerprint

Foundries
Hardware
Fabrication
Semiconductor materials
Networks (circuits)
Costs

Keywords

  • Adders
  • Ancillary Inputs
  • Design for Trust
  • Foundries
  • Hardware
  • Hardware Trojans
  • Integrated circuits
  • Logic gates
  • Reversible Circuits
  • Scrambling
  • Security
  • Trojan horses

ASJC Scopus subject areas

  • Computer Science (miscellaneous)
  • Information Systems
  • Human-Computer Interaction
  • Computer Science Applications

Cite this

On the Difficulty of Inserting Trojans in Reversible Computing Architectures. / Cui, Xiaotong; Saeed, Samah Mohamed; Zulehner, Alwin; Wille, Robert; Wu, Kaijie; Drechsler, Rolf; Karri, Ramesh.

In: IEEE Transactions on Emerging Topics in Computing, 04.04.2018.

Research output: Contribution to journalArticle

Cui, Xiaotong ; Saeed, Samah Mohamed ; Zulehner, Alwin ; Wille, Robert ; Wu, Kaijie ; Drechsler, Rolf ; Karri, Ramesh. / On the Difficulty of Inserting Trojans in Reversible Computing Architectures. In: IEEE Transactions on Emerging Topics in Computing. 2018.
@article{ffbc6a55524b4c9fb2c9eac4542dd5a2,
title = "On the Difficulty of Inserting Trojans in Reversible Computing Architectures",
abstract = "Fabrication-less design houses outsource their designs to third-party foundries to lower fabrication cost. However, this creates opportunities for a rogue in the semiconductor foundry to introduce hardware Trojans, which stay inactive most of the time and cause unintended consequences to the system when triggered. Hardware Trojans in traditional CMOSbased circuits have been studied, and Design-for-Trust (DFT) techniques have been proposed to detect them.",
keywords = "Adders, Ancillary Inputs, Design for Trust, Foundries, Hardware, Hardware Trojans, Integrated circuits, Logic gates, Reversible Circuits, Scrambling, Security, Trojan horses",
author = "Xiaotong Cui and Saeed, {Samah Mohamed} and Alwin Zulehner and Robert Wille and Kaijie Wu and Rolf Drechsler and Ramesh Karri",
year = "2018",
month = "4",
day = "4",
doi = "10.1109/TETC.2018.2823315",
language = "English (US)",
journal = "IEEE Transactions on Emerging Topics in Computing",
issn = "2168-6750",
publisher = "IEEE Computer Society",

}

TY - JOUR

T1 - On the Difficulty of Inserting Trojans in Reversible Computing Architectures

AU - Cui, Xiaotong

AU - Saeed, Samah Mohamed

AU - Zulehner, Alwin

AU - Wille, Robert

AU - Wu, Kaijie

AU - Drechsler, Rolf

AU - Karri, Ramesh

PY - 2018/4/4

Y1 - 2018/4/4

N2 - Fabrication-less design houses outsource their designs to third-party foundries to lower fabrication cost. However, this creates opportunities for a rogue in the semiconductor foundry to introduce hardware Trojans, which stay inactive most of the time and cause unintended consequences to the system when triggered. Hardware Trojans in traditional CMOSbased circuits have been studied, and Design-for-Trust (DFT) techniques have been proposed to detect them.

AB - Fabrication-less design houses outsource their designs to third-party foundries to lower fabrication cost. However, this creates opportunities for a rogue in the semiconductor foundry to introduce hardware Trojans, which stay inactive most of the time and cause unintended consequences to the system when triggered. Hardware Trojans in traditional CMOSbased circuits have been studied, and Design-for-Trust (DFT) techniques have been proposed to detect them.

KW - Adders

KW - Ancillary Inputs

KW - Design for Trust

KW - Foundries

KW - Hardware

KW - Hardware Trojans

KW - Integrated circuits

KW - Logic gates

KW - Reversible Circuits

KW - Scrambling

KW - Security

KW - Trojan horses

UR - http://www.scopus.com/inward/record.url?scp=85045192696&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85045192696&partnerID=8YFLogxK

U2 - 10.1109/TETC.2018.2823315

DO - 10.1109/TETC.2018.2823315

M3 - Article

AN - SCOPUS:85045192696

JO - IEEE Transactions on Emerging Topics in Computing

JF - IEEE Transactions on Emerging Topics in Computing

SN - 2168-6750

ER -