Hardware Trojan detection and localization based on local detectors

被引:1
|
作者
Bazzazi, Amin [1 ]
Manzuri Shalmani, Mohammad Taghi [2 ]
Hemmatyar, Ali Mohammad Afshin [2 ]
机构
[1] Sharif Univ Technol, Sch Sci & Engn, Int Campus, Kish Isl, Iran
[2] Sharif Univ Technol, Dept Comp Engn, Tehran, Iran
关键词
Hardware Trojans; run-time method; local detectors; detection; localization;
D O I
10.3906/elk-1703-81
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Hardware Trojans are one of the serious threats with detrimental, irreparable effects on the functionality, security, and performance of digital integrated circuits. It is difficult to detect Trojans because of their diversity in size and performance. While the majority of current methods focus on Trojan detection during chip testing, run-time techniques can be employed to gain unique advantages. This paper proposes a method based on the online scalable detection technique, which eliminates the need for a reference chip. Involving local detectors, this technique assesses the variations in the logical values of each node to find out whether there are Trojans. This method excludes time and power measurements, which are common parameters in most conventional methods. The detectors provide Trojan-localization capability in our proposed technique. Two remarkable features of this technique are low power and low area overhead. The results are reported by simulation and implementation of common benchmarks, which show the high Trojan detection rate of the proposed method.
引用
收藏
页码:1403 / 1416
页数:14
相关论文
共 50 条
  • [1] Hardware Trojan detection and localization based on local detectors
    Bazzazi, Amin
    Manzuri Shalmani, Mohammad Taghi
    Hemmatyar, Ali Mohammad Afshin
    [J]. Turkish Journal of Electrical Engineering and Computer Sciences, 2018, 26 (03): : 1403 - 1416
  • [2] Activity Factor Based Hardware Trojan Detection and Localization
    Yongkang Tang
    Liang Fang
    Shaoqing Li
    [J]. Journal of Electronic Testing, 2019, 35 : 293 - 302
  • [3] Activity Factor Based Hardware Trojan Detection and Localization
    Tang, Yongkang
    Fang, Liang
    Li, Shaoqing
    [J]. JOURNAL OF ELECTRONIC TESTING-THEORY AND APPLICATIONS, 2019, 35 (03): : 293 - 302
  • [4] HTrans: Transformer-based Method for Hardware Trojan Detection and Localization
    Li, Yilin
    Li, Shan
    Shen, Haihua
    [J]. 2023 IEEE 32ND ASIAN TEST SYMPOSIUM, ATS, 2023, : 31 - 36
  • [5] Hardware Trojan Detection Based on SRC
    Sun, Chen
    Cheng, Liye
    Wang, Liwei
    Huang, Yun
    [J]. 2020 35TH YOUTH ACADEMIC ANNUAL CONFERENCE OF CHINESE ASSOCIATION OF AUTOMATION (YAC), 2020, : 472 - 475
  • [6] Hardware Trojan Detection
    Alluhaib, Ghalia
    Aldissi, Hanan
    Alqarni, Rasha
    Banafee, Shoroq
    Nagro, Wafaa
    Aljandali, Asia
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2020, 20 (03): : 141 - 147
  • [7] Hardware trojan detection
    Case Western Reserve University, Cleveland, United States
    [J]. Introduction to Hardw. Secty. and Trust, (339-364):
  • [8] Hardware Trojan Detection Based on the Distance Discrimination
    Wang Jianxin
    Wang Boren
    Qu Ming
    Zhang Lei
    Xiao Chaoen
    [J]. 2016 FIRST IEEE INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND THE INTERNET (ICCCI 2016), 2016, : 404 - 407
  • [9] Hardware Trojan Detection Based on Logical Testing
    Bazzazi, Amin
    Shalmani, Mohammad Taghi Manzuri
    Hemmatyar, Ali Mohammad Afshin
    [J]. JOURNAL OF ELECTRONIC TESTING-THEORY AND APPLICATIONS, 2017, 33 (04): : 381 - 395
  • [10] Hardware Trojan Detection Based on Image Comparison
    Sun, Chen
    Guo, Xiaohui
    Li, Lingling
    Ma, Jingjing
    [J]. Lecture Notes on Data Engineering and Communications Technologies, 2022, 80 : 979 - 986