Abstract
System on chip (SoC) contains multiple intellectual properties (IPs) that work in different clock domains. Several of those IPs may even have multiple clock domains within itself and provided to SoC designers as hard IPs. Different clock domain crossing (CDC) techniques are used to communicate among different clock domains. First In First Out (FIFO) buffers are part of several CDC circuits. This research explores the possible security vulnerabilities of such SoCs in the event of compromised security in FIFO buffers. We investigated few catastrophic possibilities of hardware Trojans in FIFO buffers and discussed its potential consequences. Testing the design using random bit generation showed that the triggering probabilities of such Trojans are less than 8/1000. Our synthesis results show that majority of these Trojans require minimal area and frequency overhead, in the range of.8% and 1%, respectively, if FIFO occupies 10% space of the IP.
Original language | English |
---|---|
Title of host publication | Midwest Symposium on Circuits and Systems |
Publisher | Institute of Electrical and Electronics Engineers Inc. |
Volume | 2015-September |
ISBN (Print) | 9781467365574 |
DOIs | |
Publication status | Published - Sept 28 2015 |
Event | 58th IEEE International Midwest Symposium on Circuits and Systems, MWSCAS 2015 - Fort Collins, United States Duration: Aug 2 2015 → Aug 5 2015 |
Other
Other | 58th IEEE International Midwest Symposium on Circuits and Systems, MWSCAS 2015 |
---|---|
Country/Territory | United States |
City | Fort Collins |
Period | 8/2/15 → 8/5/15 |
Keywords
- clock domain crossing
- First In First Out (FIFO)
- Hardware Trojan
ASJC Scopus subject areas
- Electrical and Electronic Engineering
- Electronic, Optical and Magnetic Materials