Hardware Trojan Insertion and Detection in Asynchronous Circuits

被引:5
|
作者
Inaba, Koutaro [1 ]
Yoneda, Tomohiro [2 ]
Kanamoto, Toshiki [1 ]
Kurokawa, Atsushi [1 ]
Imai, Masashi [1 ]
机构
[1] Hirosaki Univ, Hirosaki, Aomori, Japan
[2] Natl Inst Informat, Tokyo, Japan
关键词
D O I
10.1109/ASYNC.2019.00025
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Hardware Trojan threats caused by malicious designers and untrusted manufacturers have become one of serious issues in modern VLSI systems. In this paper, we show some experimental results to insert hardware Trojans into asynchronous circuits. As a result, the overhead of hardware Trojan insertion in asynchronous circuits can be small if malicious designers have enough knowledge about the asynchronous circuits. In addition, we also show several Trojan detection methods using deep learning schemes which have been proposed to detect synchronous hardware Trojan in the netlist level. We have applied them to asynchronous hardware Trojan circuits and show their results. They have a great potential to detect a hardware Trojan in asynchronous circuits.
引用
收藏
页码:134 / 143
页数:10
相关论文
共 50 条
  • [41] Review on Hardware Trojan Detection Techniques
    Naveenkumar, R.
    Sivamangai, N. M.
    Napolean, A.
    Sathayapriya, S. Sridevi
    NATIONAL ACADEMY SCIENCE LETTERS-INDIA, 2023, 46 (06): : 521 - 524
  • [42] A Survey of Hardware Trojan Taxonomy and Detection
    Tehranipoor, Mohammad
    Koushanfar, Farinaz
    IEEE DESIGN & TEST OF COMPUTERS, 2010, 27 (01): : 10 - 25
  • [43] Improving hardware Trojan detection by retiming
    Shekarian, Seyed Mohammad Hossein
    Zamani, Morteza Saheb
    MICROPROCESSORS AND MICROSYSTEMS, 2015, 39 (03) : 145 - 156
  • [44] Nonlinear Analysis for Hardware Trojan Detection
    Zhou, Errui
    Zhao, Zhixun
    Li, Shaoqing
    Ni, Lin
    2015 IEEE International Conference on Signal Processing, Communications and Computing (ICSPCC), 2015, : 793 - 796
  • [45] Formal Verification for Hardware Trojan Detection
    Ponugoti, Kushal Kumar
    ProQuest Dissertations and Theses Global, 2023,
  • [46] A Pragmatic Methodology for Blind Hardware Trojan Insertion in Finalized Layouts
    Hepp, Alexander
    Perez, Tiago
    Pagliarini, Samuel
    Sigl, Georg
    2022 IEEE/ACM INTERNATIONAL CONFERENCE ON COMPUTER AIDED DESIGN, ICCAD, 2022,
  • [47] DTjRTL: A Configurable Framework for Automated Hardware Trojan Insertion at RTL
    Dai, Ruochen
    Liu, Zhaoxiang
    Arias, Orlando
    Guo, Xiaolong
    Yavuz, Tuba
    PROCEEDING OF THE GREAT LAKES SYMPOSIUM ON VLSI 2024, GLSVLSI 2024, 2024, : 465 - 470
  • [48] ANALYZING CIRCUIT VULNERABILITY TO HARDWARE TROJAN INSERTION AT THE BEHAVIORAL LEVEL
    Salmani, Hassan
    Tehranipoor, Mohammed
    PROCEEDINGS OF THE 2013 IEEE INTERNATIONAL SYMPOSIUM ON DEFECT AND FAULT TOLERANCE IN VLSI AND NANOTECHNOLOGY SYSTEMS (DFTS), 2013, : 190 - 195
  • [49] A Pragmatic Methodology for Blind Hardware Trojan Insertion in Finalized Layouts
    Hepp, Alexander
    Perez, Tiago
    Pagliarini, Samuel
    Sigl, Georg
    arXiv, 2022,
  • [50] Trojan Detection Test for Clockless Circuits
    Ricardo Aquino Guazzelli
    Matheus Garay Trindade
    Leonel Acunha Guimarães
    Thiago Ferreira de Paiva Leite
    Laurent Fesquet
    Rodrigo Possamai Bastos
    Journal of Electronic Testing, 2020, 36 : 23 - 31