Hardware Trojan Detection Using Reconfigurable Assertion Checkers

被引:10
|
作者
Alsaiari, Uthman [1 ,2 ]
Gebali, Fayez [1 ]
机构
[1] Univ Victoria, Dept Elect & Comp Engn, Victoria, BC V8P 5C2, Canada
[2] Islamic Univ Madinah, Dept Comp Engn, Madinah 42351, Saudi Arabia
关键词
Assertion checker (AC); field-programmable gate array (FPGA); hardware Trojan; property specification language (PSL) simple subset; reconfigurable;
D O I
10.1109/TVLSI.2019.2908964
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, reconfigurable assertion checkers (RACs) are proposed for hardware Trojan detection on a system-on-chip (SoC). A modified circuit design flow to incorporate RACs into an SoC is proposed. A flexible RAC architecture is developed to implement different types of assertions. Case studies of mapping a simple assertion checker into RAC are given. The utilization of RAC in detecting hardware Trojans is demonstrated in two advanced microcontroller bus architecture (AMBA) case studies: a denial-of-service (DoS) hardware Trojan and a leak of information hardware Trojan. In both cases, our proposed RAC was able to detect the hardware Trojan whenever the Trojan was triggered.
引用
收藏
页码:1575 / 1586
页数:12
相关论文
共 50 条
  • [1] Programmable Assertion Checkers for Hardware Trojan Detection
    Alsaiari, Uthman
    Gebali, Fayez
    Abd-El-Barr, Mostafa
    [J]. 2017 1ST IEEE CONFERENCE ON PHD RESEARCH IN MICROELECTRONICS AND ELECTRONICS LATIN AMERICA (PRIME-LA), 2017, : 9 - 12
  • [2] Dynamic Refinement of Hardware Assertion Checkers
    Witharana, Hasini
    Sanjaya, Sahan
    Mishra, Prabhat
    [J]. 2023 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION, DATE, 2023,
  • [3] Reusing Verification Assertions as Security Checkers for Hardware Trojan Detection
    Eslami, Mohammad
    Ghasempouri, Tara
    Pagliarini, Samuel
    [J]. PROCEEDINGS OF THE TWENTY THIRD INTERNATIONAL SYMPOSIUM ON QUALITY ELECTRONIC DESIGN (ISQED 2022), 2022, : 236 - 241
  • [4] Reusing Verification Assertions as Security Checkers for Hardware Trojan Detection
    Eslami, Mohammad
    Ghasempouri, Tara
    Pagliarini, Samuel
    [J]. arXiv, 2022,
  • [5] Incorporating efficient assertion checkers into hardware emulation
    Boulé, M
    Zilic, Z
    [J]. 2005 IEEE INTERNATIONAL CONFERENCE ON COMPUTER DESIGN: VLSI IN COMPUTERS & PROCESSORS, PROCEEDINGS, 2005, : 221 - 228
  • [6] Runtime hardware Trojan detection by reconfigurable monitoring circuits
    Reza Fani
    Morteza Saheb Zamani
    [J]. The Journal of Supercomputing, 2022, 78 : 12726 - 12752
  • [7] Runtime hardware Trojan detection by reconfigurable monitoring circuits
    Fani, Reza
    Zamani, Morteza Saheb
    [J]. JOURNAL OF SUPERCOMPUTING, 2022, 78 (10): : 12726 - 12752
  • [8] An Efficient Reconfigurable Ring Oscillator for Hardware Trojan Detection
    Pirpilidis, Filippos
    Voyiatzis, Artemios G.
    Pyrgas, Lambros
    Kitsos, Paris
    [J]. 20TH PAN-HELLENIC CONFERENCE ON INFORMATICS (PCI 2016), 2016,
  • [9] Assertion-Based Validation using Clustering and Dynamic Refinement of Hardware Checkers
    Sanjaya, Sahan
    Witharana, Hasini
    Mishra, Prabhat
    [J]. ACM Transactions on Design Automation of Electronic Systems, 2024, 29 (06)
  • [10] Translating Circuit Behavior Manifestations of Hardware Trojans using Model Checkers into Run-time Trojan Detection Monitors
    Hasan, Syed Rafay
    Kamhoua, Charles A.
    Kwiat, Kevin A.
    Njilla, Laurent
    [J]. PROCEEDINGS OF THE 2016 IEEE ASIAN HARDWARE ORIENTED SECURITY AND TRUST SYMPOSIUM (ASIANHOST 2016), 2016,