On the Difficulty of Inserting Trojans in Reversible Computing Architectures

IEEE Transactions on Emerging Topics in Computing(2020)

引用 14|浏览42
暂无评分
摘要
Fabrication-less design houses outsource their designs to third-party foundries to lower fabrication cost. However, this creates opportunities for a rogue in the semiconductor foundry to introduce hardware Trojans, which stay inactive most of the time and cause unintended consequences to the system when triggered. Hardware Trojans in traditional CMOS-based circuits have been studied, and Design-for-Trust (DFT) techniques have been proposed to detect them. Different from traditional circuits in many ways, reversible circuits implement one-to-one input/output mappings. In this paper, we investigate the security implications of reversible circuits with a particular focus on the susceptibility to hardware Trojans. To this end, we consider reversible functions implemented using reversible circuits as well as irreversible functions embedded in reversible circuits.
更多
查看译文
关键词
Hardware Trojans,design for trust,reversible circuits,scrambling,ancillary inputs
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要