A Novel Test Vector Generation Method for Hardware Trojan Detection

被引:6
|
作者
Mondal, Anindan [1 ]
Mahalat, Mahabub Hasan [1 ]
Mandal, Suraj [1 ]
Roy, Suchismita [1 ]
Sen, Bibhash [1 ]
机构
[1] Natl Inst Technol Durgapur, Dept Comp Sci & Engn, Durgapur, India
关键词
Hardware Trojans; Transition Probability; Random Vectors; Bit Toggle Probability; Rare Nets;
D O I
10.1109/SOCC46988.2019.1570548271
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Hardware Trojans arc intentional addition of malicious logic into a normal circuit which is widely regarded as one of the biggest concerns for IC industry due to the presence of a global supply chain. Being very small in size, Trojans remain dormant during manufacturing tests and only gets activated during operational mode for a rare input signal combination. Existing stuck-at-fault testing methods are insufficient for Trojan detection. In this context, a methodology to produce test vector is proposed in this work which generates rare signals inside a circuit. The proposed work uses transition probability to find rare activity nets. A set of test vectors are generated based on the impact of primary inputs on rare nets to stimulate rare signals across the 'waist. The effects of final test vectors are verified with ISCAS-85 benchmark circuits and also compared with the performance of random vectors. Simulation result advocates the significance of the proposed test vectors in terms of rare net excitation.
引用
收藏
页码:80 / 85
页数:6
相关论文
共 50 条
  • [21] A Hardware Trojan Detection Method Based on the Electromagnetic Leakage
    Zhang, Lei
    Dong, Youheng
    Wang, Jianxin
    Xiao, Chaoen
    Ding, Ding
    CHINA COMMUNICATIONS, 2019, 16 (12) : 100 - 110
  • [22] A Board-level Hardware Trojan Detection Method
    Zhang, Yang
    Wang, Jian
    Yang, Zhaorui
    PROCEEDINGS OF 2024 3RD INTERNATIONAL CONFERENCE ON CYBER SECURITY, ARTIFICIAL INTELLIGENCE AND DIGITAL ECONOMY, CSAIDE 2024, 2024, : 11 - 15
  • [23] A stealthy Hardware Trojan design and corresponding detection method
    Su, Yu
    Shen, Haihua
    Lu, Renjie
    Ye, Yunying
    2021 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2021,
  • [24] A Hardware Trojan Detection Method Based on the Electromagnetic Leakage
    Lei Zhang
    Youheng Dong
    Jianxin Wang
    Chaoen Xiao
    Ding Ding
    中国通信, 2019, 16 (12) : 100 - 110
  • [25] A Bio-Inspired Method for Hardware Trojan Detection
    Ghohroud, Najmeh Farajipour
    Hessabi, Shaahin
    2017 19TH INTERNATIONAL SYMPOSIUM ON COMPUTER ARCHITECTURE AND DIGITAL SYSTEMS (CADS), 2017, : 10 - 11
  • [26] LMDet: A "Naturalness" Statistical Method for Hardware Trojan Detection
    Shen, Haihua
    Tan, Huazhe
    Li, Huawei
    Zhang, Feng
    Li, Xiaowei
    IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 2018, 26 (04) : 720 - 732
  • [27] Hardware Trojan detection method based on circuit activity
    Zhao Y.
    Xie X.
    Liu Y.
    Liu A.
    Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition), 2018, 46 (02): : 90 - 94
  • [28] A Hardware Trojan Detection Method Based on Structural Features of Trojan and Host Circuits
    Liu, Qiang
    Zhao, Pengyong
    Chen, Fuqiang
    IEEE ACCESS, 2019, 7 : 44632 - 44644
  • [29] A Hardware Trojan Detection Method Design Based on TensorFlow
    Wu, Wenzhi
    Wei, Ying
    Ye, Ruizhe
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2019, 11910 LNCS : 244 - 252
  • [30] Physical hardware trojan failure analysis and detection method
    Luo Yang
    Wang Ya-Nan
    ACTA PHYSICA SINICA, 2016, 65 (11)