Hardware Trojan Insertion and Detection in Asynchronous Circuits

被引:5
|
作者
Inaba, Koutaro [1 ]
Yoneda, Tomohiro [2 ]
Kanamoto, Toshiki [1 ]
Kurokawa, Atsushi [1 ]
Imai, Masashi [1 ]
机构
[1] Hirosaki Univ, Hirosaki, Aomori, Japan
[2] Natl Inst Informat, Tokyo, Japan
关键词
D O I
10.1109/ASYNC.2019.00025
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Hardware Trojan threats caused by malicious designers and untrusted manufacturers have become one of serious issues in modern VLSI systems. In this paper, we show some experimental results to insert hardware Trojans into asynchronous circuits. As a result, the overhead of hardware Trojan insertion in asynchronous circuits can be small if malicious designers have enough knowledge about the asynchronous circuits. In addition, we also show several Trojan detection methods using deep learning schemes which have been proposed to detect synchronous hardware Trojan in the netlist level. We have applied them to asynchronous hardware Trojan circuits and show their results. They have a great potential to detect a hardware Trojan in asynchronous circuits.
引用
收藏
页码:134 / 143
页数:10
相关论文
共 50 条
  • [21] Hardware Trojan Detection Method for Inspecting Integrated Circuits Based on Machine Learning
    Wang, Yuze
    Liu, Peng
    Han, Xiaoxia
    Jiang, Yingtao
    PROCEEDINGS OF THE 2021 TWENTY SECOND INTERNATIONAL SYMPOSIUM ON QUALITY ELECTRONIC DESIGN (ISQED 2021), 2021, : 432 - 436
  • [22] A General Framework for Hardware Trojan Detection in Digital Circuits by Statistical Learning Algorithms
    Chen, Xiaoming
    Wang, Lin
    Wang, Yu
    Liu, Yongpan
    Yang, Huazhong
    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2017, 36 (10) : 1633 - 1646
  • [23] Trojan Circuits Masking and Debugging of Combinational Circuits with LUT Insertion
    Matrosova, A.
    Ostanin, S.
    2018 IEEE INTERNATIONAL CONFERENCE ON AUTOMATION, QUALITY AND TESTING, ROBOTICS (AQTR), 2018,
  • [24] Advances in Hardware Trojan Detection
    Vaidya, Jaideep
    COMPUTER, 2019, 52 (06) : 4 - 5
  • [25] HAL-The Missing Piece of the Puzzle for Hardware Reverse Engineering, Trojan Detection and Insertion
    Fyrbiak, Marc
    Wallat, Sebastian
    Swierczynski, Pawel
    Hoffmann, Max
    Hoppach, Sebastian
    Wilhelm, Matthias
    Weidlich, Tobias
    Tessier, Russell
    Paar, Christof
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2019, 16 (03) : 498 - 510
  • [26] Vulnerability Analysis of a Circuit Layout to Hardware Trojan Insertion
    Salmani, Hassan
    Tehranipoor, Mark M.
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (06) : 1214 - 1225
  • [27] Hardware Trojan Detection in Soft Error Tolerant Macro Synchronous Micro Asynchronous (MSMA) Pipeline
    Lodhi, Faiq Khalid
    Hasan, Syed Rafay
    Hasan, Osman
    Awwad, Falah
    2014 IEEE 57TH INTERNATIONAL MIDWEST SYMPOSIUM ON CIRCUITS AND SYSTEMS (MWSCAS), 2014, : 659 - 662
  • [28] Illegal Trojan design and detection in asynchronous NULL Convention Logic and Sleep Convention Logic circuits
    Ponugoti, Kushal K.
    Srinivasan, Sudarshan K.
    Smith, Scott C.
    Mathure, Nimish
    IET COMPUTERS AND DIGITAL TECHNIQUES, 2022, 16 (5-6): : 172 - 182
  • [29] Survey of Hardware Trojan Threats and Detection
    Hayashi, Yuichi
    Kawamura, Shinichi
    PROCEEDINGS OF THE 2020 INTERNATIONAL SYMPOSIUM ON ELECTROMAGNETIC COMPATIBILITY (EMC EUROPE), 2020,
  • [30] Survey: Hardware Trojan Detection for Netlist
    Yang, Yipei
    Ye, Jing
    Cao, Yuan
    Zhang, Jiliang
    Li, Xiaowei
    Li, Huawei
    Hu, Yu
    2020 IEEE 29TH ASIAN TEST SYMPOSIUM (ATS), 2020, : 48 - 53