Hardware Trojan Detection using ATPG and Model Checking

被引:41
|
作者
Cruz, Jonathan [1 ]
Farahmandi, Farimah [2 ]
Ahmed, Alif [2 ]
Mishra, Prabhat [2 ]
机构
[1] Univ Florida, Dept Elect & Comp Engn, Gainesville, FL 32611 USA
[2] Univ Florida, Dept Comp & Informat Sci & Engn, Gainesville, FL USA
基金
美国国家科学基金会;
关键词
D O I
10.1109/VLSID.2018.43
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The threat of hardware Trojans' existence in integrated circuits has become a major concern in System-on-Chip (SoC) design industry as well as in military/defense organizations. There is an increased emphasis on finding effective ways to detect and activate hardware Trojans in current research efforts. However, state-of-the-art approaches suffer from the lack of completeness and scalability. Moreover, most of the existing methods cannot generate efficient tests to activate the potential hidden Trojan. In this paper, we propose an effective test generation approach which is capable of activating malicious functionality hidden in large sequential designs. Automatic test pattern generation (ATPG) works well on full-scan designs, whereas model checking is suitable for logic blocks without scan chain. Due to overhead considerations, partial-scan chain insertion is the standard practice today. Unfortunately, neither ATPG nor model checking is suitable for partial-scan designs. Our proposed hardware Trojan detection technique utilizes the combination of ATPG and model checking approaches. We use model checking on a subset of non-scan elements and ATPG on scan elements to avoid common pitfalls of running the original design using any one of these techniques. Experimental results demonstrate the effectiveness of tests generated by our proposed approach to detect Trojans on Trust-hub benchmarks.
引用
收藏
页码:91 / 96
页数:6
相关论文
共 50 条
  • [31] Survey of Hardware Trojan Threats and Detection
    Hayashi, Yuichi
    Kawamura, Shinichi
    [J]. PROCEEDINGS OF THE 2020 INTERNATIONAL SYMPOSIUM ON ELECTROMAGNETIC COMPATIBILITY (EMC EUROPE), 2020,
  • [32] Survey: Hardware Trojan Detection for Netlist
    Yang, Yipei
    Ye, Jing
    Cao, Yuan
    Zhang, Jiliang
    Li, Xiaowei
    Li, Huawei
    Hu, Yu
    [J]. 2020 IEEE 29TH ASIAN TEST SYMPOSIUM (ATS), 2020, : 48 - 53
  • [33] Character Reassignment for Hardware Trojan Detection
    Waller, Noah
    Nauman, Hunter
    Taylor, Derek
    Del Carmen, Rafael
    Di, Jia
    [J]. 2021 IEEE INTERNATIONAL MIDWEST SYMPOSIUM ON CIRCUITS AND SYSTEMS (MWSCAS), 2021, : 861 - 864
  • [34] Smart Hardware Trojan Detection System
    Alkhazendar, Iyad
    Zubair, Mohammed
    Qidwai, Uvais
    [J]. INTELLIGENT SYSTEMS AND APPLICATIONS, VOL 3, 2023, 544 : 791 - 806
  • [35] A Survey on Hardware Trojan Detection Techniques
    Bhasin, Shivam
    Regazzoni, Francesco
    [J]. 2015 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2015, : 2021 - 2024
  • [36] Towards a Hardware Trojan Detection Cycle
    Dabrowski, Adrian
    Hobel, Heidelinde
    Ullrich, Johanna
    Krombholz, Katharina
    Weippl, Edgar
    [J]. 2014 NINTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES), 2015, : 287 - 294
  • [37] Review on Hardware Trojan Detection Techniques
    R. Naveenkumar
    N. M. Sivamangai
    A. Napolean
    S. Sridevi Sathayapriya
    [J]. National Academy Science Letters, 2023, 46 : 521 - 524
  • [38] Hardware Trojan Detection Based on SRC
    Sun, Chen
    Cheng, Liye
    Wang, Liwei
    Huang, Yun
    [J]. 2020 35TH YOUTH ACADEMIC ANNUAL CONFERENCE OF CHINESE ASSOCIATION OF AUTOMATION (YAC), 2020, : 472 - 475
  • [39] Classification of Hardware Trojan Detection Techniques
    Moein, Samer
    Subramnian, Jayaram
    Gulliver, T. Aaron
    Gebali, Fayez
    El-Kharashi, M. Watheq
    [J]. 2015 TENTH INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING & SYSTEMS (ICCES), 2015, : 357 - 362
  • [40] Hardware Trojan Detection Methodology for FPGA
    Al-Anwar, Amr
    Alkabani, Yousra
    El-Kharashi, M. Watheq
    Bedour, Hassan
    [J]. 2013 IEEE PACIFIC RIM CONFERENCE ON COMMUNICATIONS, COMPUTERS AND SIGNAL PROCESSING (PACRIM), 2013, : 177 - 182