SOFTWARE IMPLEMENTATION OF IC TOPOLOGY TRANSFORMATIONS FOR PROTECTION AGAINST HARDWARE TROJANS
Journal: Proceedings on Engineering Sciences (Vol.5, No. 4)Publication Date: 2023-09-30
Authors : Evgeniy Pevtsov Tatiana Demenkova Alexander Sigov Alexander Shnyakin Semyon Moskolenko;
Page : 399-416
Keywords : hardware Trojans; Topology Transformation; Built-In Self-Authentication Scheme;
Abstract
This article focuses on software methods for detecting and preventing the introduction of hardware trojans into the topology of integrated circuits at the design stage. An additional recommendation for typical procedures of receiving GDSII files that significantly complicates the introduction of HTs into the topology is to facilitate detection methods by including special self-test structures created after performing transformations of the initial topology and ensuring the effective examination of ICs at the post-manufacture test stage. The proposed method is based on the analysis of synthesis results at the level of netlist description, its subsequent software conversion into a topological drawing, shifting standard cells and filling created voids with special self-test cells. The method is simple to implement during the topology design stage and can be recommended for use in design centres for machine learning of computer-aided design systems.
Other Latest Articles
- CONTROL OF THE ULTRASONIC EMITTERS PARAMETERS TO DETERMINE THE DEGREE OF TOOL MATERIALS AND PROTECTIVE COATINGS CAVITATION DESTRUCTION
- CREATED AND REALIZATION OF A DEMOGRAPHIC POPULATION MODEL FOR A SMALL CITY
- LEAN SIX SIGMA BARRIERS WITH POTENTIAL SOLUTIONS IN ELECTRICAL VEHICLE ASSEMBLY: A REVIEW
- THE AVAILABILITY OF THE DOCUMENTATION REQUIREMENT TO OBTAIN THE ISO 9001:2015 CERTIFICATE IN PREFABRICATED BUILDING FACTORY- IRAQ: A CASE STUDY
- SPECIFICS OF PIRATED TRANSLATIONS OF AMERICAN FEATURE FILMS INTO RUSSIAN VIA SINGLE VOICE-OVER
Last modified: 2023-09-19 19:21:11