Hardware Trojan Detection Based on Logical Testing

被引:23
|
作者
Bazzazi, Amin [1 ]
Shalmani, Mohammad Taghi Manzuri [2 ]
Hemmatyar, Ali Mohammad Afshin [2 ]
机构
[1] Sharif Univ Technol, Sch Sci & Engn, Int Campus, Kish Island, Iran
[2] Sharif Univ Technol, Comp Fac, Dept Comp Engn, Tehran, Iran
关键词
Hardware security; Hardware Trojans; Trojan localization; Detection methods; Runtime; Logic testing;
D O I
10.1007/s10836-017-5670-0
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In recent years, hardware Trojans (HTs) have become one of the main challenging concerns within the chain of manufacturing digital integrated circuit chips. Because of their diversity in chips, HTs are difficult to detect and locate. This paper attempted to propose a new improved method for detection and localization of HTs based on the real-time logical values of nodes. The algorithm extracts the nodes with special attributes. At the next stage, the nodes with the greatest similarity in terms of logical value are selected as targets. Depending on the size of the circuit, the extraction continues until a sufficient number of similar nodes has been selected. The logical relationship between the candidate nodes yields a function, the logical values of which differ in the Trojan-free and Trojan-infected modes, thus detecting the potential Trojans. This method is scalable, overcoming the problems of noise and Process variation. The success rate of Trojan detection in this method is more than 80%. The most overhead is 13% for power consumption and 15% for area.
引用
下载
收藏
页码:381 / 395
页数:15
相关论文
共 50 条
  • [31] On Reverse Engineering-Based Hardware Trojan Detection
    Bao, Chongxi
    Forte, Domenic
    Srivastava, Ankur
    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2016, 35 (01) : 49 - 57
  • [32] A Hardware Trojan Detection Method Based on the Electromagnetic Leakage
    Lei Zhang
    Youheng Dong
    Jianxin Wang
    Chaoen Xiao
    Ding Ding
    China Communications, 2019, 16 (12) : 100 - 110
  • [33] Hardware Trojan Detection Based on Multiple Structural Features
    Yan Yingjian
    Zhao Conghui
    Liu Yanjiang
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2021, 43 (08) : 2128 - 2139
  • [34] Selective Concolic Testing for Hardware Trojan Detection in Behavioral SystemC Designs
    Bin Lin
    Chen, Jinchao
    Xie, Fei
    PROCEEDINGS OF THE 2020 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION (DATE 2020), 2020, : 19 - 24
  • [35] Hardware Trojan detection method based on circuit activity
    Zhao Y.
    Xie X.
    Liu Y.
    Liu A.
    Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition), 2018, 46 (02): : 90 - 94
  • [36] Advances in Hardware Trojan Detection
    Vaidya, Jaideep
    COMPUTER, 2019, 52 (06) : 4 - 5
  • [37] Hardware Trojan Detection Based on ELM Neural Network
    Wang, Sixiang
    Dong, Xiuze
    Sun, Kewang
    Cui, Qi
    Li, Dongxu
    He, Chunxiao
    2016 FIRST IEEE INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND THE INTERNET (ICCCI 2016), 2016, : 400 - 403
  • [38] A Region Based Fingerprinting for Hardware Trojan Detection and Diagnosis
    Saran, T.
    Ranjani, R.
    Devi, Nirmala M.
    2017 4TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND INTEGRATED NETWORKS (SPIN), 2017, : 166 - 172
  • [39] Activity Factor Based Hardware Trojan Detection and Localization
    Tang, Yongkang
    Fang, Liang
    Li, Shaoqing
    JOURNAL OF ELECTRONIC TESTING-THEORY AND APPLICATIONS, 2019, 35 (03): : 293 - 302
  • [40] A Hardware Trojan Detection Method Design Based on TensorFlow
    Wu, Wenzhi
    Wei, Ying
    Ye, Ruizhe
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2019, 11910 LNCS : 244 - 252