Techniques for Creation and Insertion of Test Points for Malicious Circuitry Detection

Tech ID: 30202 / UC Case 2012-745-0

Summary

Researchers led by Dr. Potkonjak from the UCLA Department of Computer Science have developed a technique to detect hardware Trojans in integrated circuits.

Background

Integrated circuits (ICs) play key roles in most of today’s technologies ranging from mobile devices to computers. The high cost of fabricating ICs results in the dominance of a contract-foundry semiconductor business model in which multiple independent entities come together to create large batches of ICs to defray the cost. This process leaves ICs vulnerable to hardware Trojans, unwanted components added to ICs during the manufacturing process that enable monitoring or spying. Trojans are currently detected using side channel measurements of delay and power leakage. However, inherent variation in the production of ICs along with the complexity of their circuits allows Trojans to hide in ICs undetected.

Innovation

Researchers led by Dr. Potkonjak from the UCLA Department of Computer Science have developed a technique to detect hardware Trojans in integrated circuits. The effectiveness of current Trojan detection decreases with complex circuit paths with many convergence points and with Trojans that look like inherent IC variation. Their invention uses a set of test points that can detect hardware Trojans regardless of the convergence of IC paths and inherent variation. This invention can be applied to any arbitrary IC design to provide robust and effective Trojan detection. Furthermore, this invention uses very little computational overhead (<5%).

Applications

  • Hardware Trojan detection 
  • Maintenance of ICs 
  • Calculating life expectancy of ICs

Advantages

  • Flexible to any IC design 
  • Inexpensive 
  • Low computational overhead 
  • Robust

Contact

Learn About UC TechAlerts - Save Searches and receive new technology matches

Inventors

  • Potkonjak, Miodrag

Other Information

Keywords

Integrated circuits, FPGA, computer, hardware, fabrication, power leakage, delay measurements, Trojan, malware

Categorized As