Hardware Trojan Detection in Behavioral Intellectual Properties (IP's) Using Property Checking Techniques

被引:20
|
作者
Veeranna, Nandeesha [1 ]
Schafer, Benjamin Carrion [1 ]
机构
[1] Hong Kong Polytech Univ, Dept Elect & Informat Engn, Kowloon, Hong Kong, Peoples R China
关键词
Behavioral IPs; HW trojans; high-level synthesis; formal verification; property checking;
D O I
10.1109/TETC.2016.2585046
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This work introduces a fully automatic method to detect the presence of HW Trojans in third party behavioral IPs (3PBIPs) using formal verification methods. In particular, property checking at the behavioral level. Some state of the art High-Level Synthesis (HLS) tools now also include advanced formal verification tools. This work leverages these tools to detect the malicious alteration of 3PIPs when no golden reference IP is available. This work has also been extended to detect HW Trojans built into encrypted 3PBIPs by performing High-Level Synthesis on these IPs and re-constructing the C code in order to perform the verification on them. We present three case studies of two of the most typical HW Trojans with different trigger and payload mechanisms. The first leads to the malfunction of the IP, the second leaks information while the third leads to the denial of service. In all three cases, our proposed method was able to detect the HW Trojan in a fully automatic way.
引用
收藏
页码:576 / 585
页数:10
相关论文
共 50 条
  • [1] Hardware Trojan Detection Using Effective Property-Checking Method
    Li, Dejian
    Zhang, Qizhi
    Zhao, Dongyan
    Li, Lei
    He, Jiaji
    Yuan, Yidong
    Zhao, Yiqiang
    [J]. ELECTRONICS, 2022, 11 (17)
  • [2] Hardware Trojan Detection using ATPG and Model Checking
    Cruz, Jonathan
    Farahmandi, Farimah
    Ahmed, Alif
    Mishra, Prabhat
    [J]. 2018 31ST INTERNATIONAL CONFERENCE ON VLSI DESIGN AND 2018 17TH INTERNATIONAL CONFERENCE ON EMBEDDED SYSTEMS (VLSID & ES), 2018, : 91 - 96
  • [3] Review on Hardware Trojan Detection Techniques
    R. Naveenkumar
    N. M. Sivamangai
    A. Napolean
    S. Sridevi Sathayapriya
    [J]. National Academy Science Letters, 2023, 46 : 521 - 524
  • [4] A Survey on Hardware Trojan Detection Techniques
    Bhasin, Shivam
    Regazzoni, Francesco
    [J]. 2015 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2015, : 2021 - 2024
  • [5] Review on Hardware Trojan Detection Techniques
    Naveenkumar, R.
    Sivamangai, N. M.
    Napolean, A.
    Sathayapriya, S. Sridevi
    [J]. NATIONAL ACADEMY SCIENCE LETTERS-INDIA, 2023, 46 (06): : 521 - 524
  • [6] Classification of Hardware Trojan Detection Techniques
    Moein, Samer
    Subramnian, Jayaram
    Gulliver, T. Aaron
    Gebali, Fayez
    El-Kharashi, M. Watheq
    [J]. 2015 TENTH INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING & SYSTEMS (ICCES), 2015, : 357 - 362
  • [7] INTELLECTUAL PROPERTY (IP) PROTECTION USING WATERMARKING AND FINGERPRINTING TECHNIQUES
    Leitao, Flavia
    [J]. PROCEEDINGS OF THE 2016 2ND INTERNATIONAL CONFERENCE ON APPLIED AND THEORETICAL COMPUTING AND COMMUNICATION TECHNOLOGY (ICATCCT), 2016, : 433 - 438
  • [8] Hardware Trojan Detection Using Changepoint-Based Anomaly Detection Techniques
    Elnaggar, Rana
    Chakrabarty, Krishnendu
    Tahoori, Mehdi B.
    [J]. IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 2019, 27 (12) : 2706 - 2719
  • [9] A method of hardware-trojan detection using design verification techniques
    Graduate school of Engineering, Oita University, 700 Dannoharu, Oita
    870-1192, Japan
    不详
    870-1192, Japan
    [J]. Adv. Intell. Sys. Comput, (978-987):
  • [10] A Method of Hardware-Trojan Detection Using Design Verification Techniques
    Hiramoto, Yushiro
    Ohtake, Satoshi
    [J]. COMPLEX, INTELLIGENT, AND SOFTWARE INTENSIVE SYSTEMS, 2019, 772 : 978 - 987