Hardware Trojan Detection using ATPG and Model Checking

被引:41
|
作者
Cruz, Jonathan [1 ]
Farahmandi, Farimah [2 ]
Ahmed, Alif [2 ]
Mishra, Prabhat [2 ]
机构
[1] Univ Florida, Dept Elect & Comp Engn, Gainesville, FL 32611 USA
[2] Univ Florida, Dept Comp & Informat Sci & Engn, Gainesville, FL USA
基金
美国国家科学基金会;
关键词
D O I
10.1109/VLSID.2018.43
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The threat of hardware Trojans' existence in integrated circuits has become a major concern in System-on-Chip (SoC) design industry as well as in military/defense organizations. There is an increased emphasis on finding effective ways to detect and activate hardware Trojans in current research efforts. However, state-of-the-art approaches suffer from the lack of completeness and scalability. Moreover, most of the existing methods cannot generate efficient tests to activate the potential hidden Trojan. In this paper, we propose an effective test generation approach which is capable of activating malicious functionality hidden in large sequential designs. Automatic test pattern generation (ATPG) works well on full-scan designs, whereas model checking is suitable for logic blocks without scan chain. Due to overhead considerations, partial-scan chain insertion is the standard practice today. Unfortunately, neither ATPG nor model checking is suitable for partial-scan designs. Our proposed hardware Trojan detection technique utilizes the combination of ATPG and model checking approaches. We use model checking on a subset of non-scan elements and ATPG on scan elements to avoid common pitfalls of running the original design using any one of these techniques. Experimental results demonstrate the effectiveness of tests generated by our proposed approach to detect Trojans on Trust-hub benchmarks.
引用
收藏
页码:91 / 96
页数:6
相关论文
共 50 条
  • [1] Hardware Trojan Detection Using Effective Property-Checking Method
    Li, Dejian
    Zhang, Qizhi
    Zhao, Dongyan
    Li, Lei
    He, Jiaji
    Yuan, Yidong
    Zhao, Yiqiang
    [J]. ELECTRONICS, 2022, 11 (17)
  • [2] A New ATPG and Online Monitoring based Technique for Hardware Trojan Detection
    Rathor, Vijaypal Singh
    Sharma, G.K.
    [J]. Microprocessors and Microsystems, 2023, 101
  • [3] A New ATPG and Online Monitoring based Technique for Hardware Trojan Detection
    Rathor, Vijaypal Singh
    Sharma, G. K.
    [J]. MICROPROCESSORS AND MICROSYSTEMS, 2023, 101
  • [4] Checking nested properties using bounded model checking and sequential ATPG
    Qiang, Q
    Saab, DG
    Abraham, JA
    [J]. 19TH INTERNATIONAL CONFERENCE ON VLSI DESIGN, PROCEEDINGS, 2005, : 225 - 230
  • [5] Hardware Trojan Detection in Behavioral Intellectual Properties (IP's) Using Property Checking Techniques
    Veeranna, Nandeesha
    Schafer, Benjamin Carrion
    [J]. IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2017, 5 (04) : 576 - 585
  • [6] A Novel ATPG Method to Increase Activation Probability of Hardware Trojan
    Xu, Tianliang
    Wang, Chenxu
    Zhao, Shiyao
    Zhou, Zhiquan
    Luo, Min
    Wang, Xinsheng
    [J]. 2019 IEEE PACIFIC RIM CONFERENCE ON COMMUNICATIONS, COMPUTERS AND SIGNAL PROCESSING (PACRIM), 2019,
  • [7] On the feasibility of using evolvable hardware for hardware Trojan detection and prevention
    Labafniya, Mansoureh
    Picek, Stjepan
    Borujeni, Shahram Etemadi
    Mentens, Nele
    [J]. APPLIED SOFT COMPUTING, 2020, 91
  • [8] Hardware Trojan Detection using FBHT in FPGAs
    Qayyum, Sundus
    Qureshi, Kashif Naseer
    Bashir, Faisal
    Ul Islam, Najam
    Malik, Nazir
    [J]. PROCEEDINGS OF 2020 17TH INTERNATIONAL BHURBAN CONFERENCE ON APPLIED SCIENCES AND TECHNOLOGY (IBCAST), 2020, : 422 - 427
  • [9] Hardware Trojan Detection using Xilinx Vivado
    Marlow, Ryan
    Harper, Scott
    Batchelor, Whitney
    Graf, Jonathan
    [J]. NAECON 2018 - IEEE NATIONAL AEROSPACE AND ELECTRONICS CONFERENCE, 2018, : 86 - 91
  • [10] Hardware Trojan Detection
    Alluhaib, Ghalia
    Aldissi, Hanan
    Alqarni, Rasha
    Banafee, Shoroq
    Nagro, Wafaa
    Aljandali, Asia
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2020, 20 (03): : 141 - 147