Mobile QR Code QR CODE
Title [LETTER] Employing Linear Feedback Shift Register as a New Hardware Trojan and Extending ML-FASTrust Method as its Detection Algorithm
Authors Ann Jelyn Tiempo; Woo-Young Jung; Yong-Jin Jeong
DOI https://doi.org/10.5573/JSTS.2020.20.2.214
Page pp.214-219
ISSN 1598-1657
Keywords Hardware security; hardware trojan; third-party IP trust; LFSR-based
Abstract Several verification and detection methods have been proposed to prevent and mitigate the effects of hardware trojans. However, existing hardware trojan designs appeared in the literature are limited and simple which limits the capability of existing detection methods. In this paper, a new hardware trojan is proposed based on linear feedback shift register (LFSR) and extends its stealthiness by adding a shift register, which results undetected by existing state-of-the-art detection algorithms. In addition, extending an existing detection method to attain possible defense is implemented by using a comparison scheme. Experimental results show that the new hardware trojan evades existing detection method and further can be detected by the proposed extended algorithm.