Hardware Trojan Detection Based on Logical Testing

被引:23
|
作者
Bazzazi, Amin [1 ]
Shalmani, Mohammad Taghi Manzuri [2 ]
Hemmatyar, Ali Mohammad Afshin [2 ]
机构
[1] Sharif Univ Technol, Sch Sci & Engn, Int Campus, Kish Island, Iran
[2] Sharif Univ Technol, Comp Fac, Dept Comp Engn, Tehran, Iran
关键词
Hardware security; Hardware Trojans; Trojan localization; Detection methods; Runtime; Logic testing;
D O I
10.1007/s10836-017-5670-0
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In recent years, hardware Trojans (HTs) have become one of the main challenging concerns within the chain of manufacturing digital integrated circuit chips. Because of their diversity in chips, HTs are difficult to detect and locate. This paper attempted to propose a new improved method for detection and localization of HTs based on the real-time logical values of nodes. The algorithm extracts the nodes with special attributes. At the next stage, the nodes with the greatest similarity in terms of logical value are selected as targets. Depending on the size of the circuit, the extraction continues until a sufficient number of similar nodes has been selected. The logical relationship between the candidate nodes yields a function, the logical values of which differ in the Trojan-free and Trojan-infected modes, thus detecting the potential Trojans. This method is scalable, overcoming the problems of noise and Process variation. The success rate of Trojan detection in this method is more than 80%. The most overhead is 13% for power consumption and 15% for area.
引用
下载
收藏
页码:381 / 395
页数:15
相关论文
共 50 条
  • [1] Hardware Trojan Detection Based on Logical Testing
    Amin Bazzazi
    Mohammad Taghi Manzuri Shalmani
    Ali Mohammad Afshin Hemmatyar
    Journal of Electronic Testing, 2017, 33 : 381 - 395
  • [2] A PCA and Mahalanobis distance-based detection method for logical hardware Trojan
    Huang, Jiaoying
    Yang, Daming
    Gao, Cheng
    Fu, Chengcheng
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2019, 31 (12):
  • [3] Experiences In Side Channel and Testing Based Hardware Trojan Detection
    Hely, David
    Martin, Julien
    Triana, Gerson Dario Piraquive
    Mounier, Simon Piroux
    Riviere, Elie
    Sahuc, Thibault
    Savonet, Jeremy
    Soundararadjou, Laura
    2013 IEEE 31ST VLSI TEST SYMPOSIUM (VTS), 2013,
  • [4] A New Testing Method for Hardware Trojan Detection
    Nejadmoghadam, Fahimeh
    Mahani, Ali
    Kavian, Yousef S.
    CONFERENCE ON ELECTRONICS, TELECOMMUNICATIONS AND COMPUTERS - CETC 2013, 2014, 17 : 713 - 719
  • [5] OERCA: A Novel Approach for Hardware Trojan Detection Based on Combinatorial Testing
    Zhang, Yi-lun
    Yan, Ying-jian
    Chuan, Xin
    Li, Jun-wei
    2018 INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATION AND NETWORK TECHNOLOGY (CCNT 2018), 2018, 291 : 74 - 81
  • [6] Hardware Trojan Detection Based on SRC
    Sun, Chen
    Cheng, Liye
    Wang, Liwei
    Huang, Yun
    2020 35TH YOUTH ACADEMIC ANNUAL CONFERENCE OF CHINESE ASSOCIATION OF AUTOMATION (YAC), 2020, : 472 - 475
  • [7] Hardware Trojan Detection Using an Advised Genetic Algorithm Based Logic Testing
    Nourian, M. A.
    Fazeli, M.
    Hely, D.
    JOURNAL OF ELECTRONIC TESTING-THEORY AND APPLICATIONS, 2018, 34 (04): : 461 - 470
  • [8] Hardware Trojan Detection Using an Advised Genetic Algorithm Based Logic Testing
    M. A. Nourian
    M. Fazeli
    D. Hely
    Journal of Electronic Testing, 2018, 34 : 461 - 470
  • [9] Hardware Trojan Detection
    Alluhaib, Ghalia
    Aldissi, Hanan
    Alqarni, Rasha
    Banafee, Shoroq
    Nagro, Wafaa
    Aljandali, Asia
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2020, 20 (03): : 141 - 147
  • [10] Hardware trojan detection
    Case Western Reserve University, Cleveland, United States
    Introduction to Hardw. Secty. and Trust, (339-364):