RING OSCILLATOR BASED DESIGN-FOR-TRUST
First Claim
1. A computer-implemented method for enabling detection of a Trojan in an integrated circuit (IC), the computer-implemented method comprising:
- a) selecting a path in the IC based on a path selection criteria, wherein the path has one or more unsecured gates;
b) embedding a ring oscillator on the IC to secure the one or more unsecured gates in the selected path;
c) determining an input pattern to be provided to the IC, to activate the embedded ring oscillator;
d) repeating acts (a)-(c) until a stop condition is met; and
e) determining a golden frequency of each of one or more of the embedded ring oscillators, wherein the golden frequency is a frequency at which the embedded ring oscillator oscillates without a presence of the Trojan.
1 Assignment
0 Petitions
Accused Products
Abstract
A ring oscillator (RO) based Design-For-Trust (DFTr) technique is described. Functional paths of integrated circuit (IC) are included in one or more embedded ROs by (1) selecting a path in the IC, based on path selection criteria, that has one or more unsecured gates, and (2) embedding one or more ROs on the IC until a stop condition is met. An input pattern to activate embedded RO is determined. Further, a golden frequency which is a frequency at which the embedded RO oscillates, and a frequency range of the embedded RO are determined. A Trojan in the IC may be detected by activating the embedded RO (by applying the input pattern), measuring a frequency at which the embedded RO oscillates, and determining whether or not a Trojan is present based on whether or not the measured frequency of the RO is within a predetermined operating frequency range of the RO.
-
Citations
36 Claims
-
1. A computer-implemented method for enabling detection of a Trojan in an integrated circuit (IC), the computer-implemented method comprising:
-
a) selecting a path in the IC based on a path selection criteria, wherein the path has one or more unsecured gates; b) embedding a ring oscillator on the IC to secure the one or more unsecured gates in the selected path; c) determining an input pattern to be provided to the IC, to activate the embedded ring oscillator; d) repeating acts (a)-(c) until a stop condition is met; and e) determining a golden frequency of each of one or more of the embedded ring oscillators, wherein the golden frequency is a frequency at which the embedded ring oscillator oscillates without a presence of the Trojan. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. Apparatus comprising:
-
at least one processor; at least one input device; and at least one storage device storing program instructions which, when executed by the at least one processor, performs a method for enabling detection of a Trojan in an integrated circuit (IC), the method including; a) selecting a path in the IC based on a path selection criteria, wherein the path has one or more unsecured gates; b) embedding a ring oscillator on the IC to secure the one or more unsecured gates in the selected path; c) determining an input pattern to be provided to the IC, to activate the embedded ring oscillator; d) repeating acts (a)-(c) until a stop condition is met; and e) determining a golden frequency of each of one or more of the embedded ring oscillators, wherein the golden frequency is a frequency at which the embedded ring oscillator oscillates without a presence of the Trojan. - View Dependent Claims (20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36)
-
Specification