MERO: A Statistical Approach for Hardware Trojan Detection

被引:0
|
作者
Chakraborty, Rajat Subhra [1 ]
Wolff, Francis [1 ]
Paul, Somnath [1 ]
Papachristou, Christos [1 ]
Bhunia, Swarup [1 ]
机构
[1] Case Western Reserve Univ, Dept Elect Engn & Comp Sci, Cleveland, OH 44106 USA
关键词
QUALITY; ATPG;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In order to ensure trusted in-field operation of integrated circuits, it is important to develop efficient low-cost techniques to detect malicious tampering (also referred to as Hardware Trojan) that causes undesired change in functional behavior. Conventional post-manufacturing testing, test generation algorithms and test coverage metrics cannot be readily extended to hardware Trojan detection. In this paper; we propose a test pattern generation technique based on multiple excitation of rare logic conditions at internal nodes. Such a statistical approach maximizes the probability of inserted Trojans getting triggered and detected by logic testing, while drastically reducing the number of vectors compared to a weighted random pattern based test generation. Moreover, the proposed test generation approach can be effective towards increasing the sensitivity of Trojan detection in existing side-channel approaches that monitor the impact of a Trojan circuit on power or current signature. Simulation results for a set of ISCAS benchmarks show that the proposed test generation approach can achieve comparable or better Trojan detection coverage with about 85% reduction in test length on average over random patterns.
引用
收藏
页码:396 / 410
页数:15
相关论文
共 50 条
  • [21] Survey: Hardware Trojan Detection for Netlist
    Yang, Yipei
    Ye, Jing
    Cao, Yuan
    Zhang, Jiliang
    Li, Xiaowei
    Li, Huawei
    Hu, Yu
    [J]. 2020 IEEE 29TH ASIAN TEST SYMPOSIUM (ATS), 2020, : 48 - 53
  • [22] Character Reassignment for Hardware Trojan Detection
    Waller, Noah
    Nauman, Hunter
    Taylor, Derek
    Del Carmen, Rafael
    Di, Jia
    [J]. 2021 IEEE INTERNATIONAL MIDWEST SYMPOSIUM ON CIRCUITS AND SYSTEMS (MWSCAS), 2021, : 861 - 864
  • [23] Review on Hardware Trojan Detection Techniques
    R. Naveenkumar
    N. M. Sivamangai
    A. Napolean
    S. Sridevi Sathayapriya
    [J]. National Academy Science Letters, 2023, 46 : 521 - 524
  • [24] Hardware Trojan Detection Based on SRC
    Sun, Chen
    Cheng, Liye
    Wang, Liwei
    Huang, Yun
    [J]. 2020 35TH YOUTH ACADEMIC ANNUAL CONFERENCE OF CHINESE ASSOCIATION OF AUTOMATION (YAC), 2020, : 472 - 475
  • [25] Formal Verification for Hardware Trojan Detection
    Ponugoti, Kushal Kumar
    [J]. ProQuest Dissertations and Theses Global, 2023,
  • [26] A Survey on Hardware Trojan Detection Techniques
    Bhasin, Shivam
    Regazzoni, Francesco
    [J]. 2015 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2015, : 2021 - 2024
  • [27] Towards a Hardware Trojan Detection Cycle
    Dabrowski, Adrian
    Hobel, Heidelinde
    Ullrich, Johanna
    Krombholz, Katharina
    Weippl, Edgar
    [J]. 2014 NINTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES), 2015, : 287 - 294
  • [28] Smart Hardware Trojan Detection System
    Alkhazendar, Iyad
    Zubair, Mohammed
    Qidwai, Uvais
    [J]. INTELLIGENT SYSTEMS AND APPLICATIONS, VOL 3, 2023, 544 : 791 - 806
  • [29] Classification of Hardware Trojan Detection Techniques
    Moein, Samer
    Subramnian, Jayaram
    Gulliver, T. Aaron
    Gebali, Fayez
    El-Kharashi, M. Watheq
    [J]. 2015 TENTH INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING & SYSTEMS (ICCES), 2015, : 357 - 362
  • [30] Hardware Trojan Detection Methodology for FPGA
    Al-Anwar, Amr
    Alkabani, Yousra
    El-Kharashi, M. Watheq
    Bedour, Hassan
    [J]. 2013 IEEE PACIFIC RIM CONFERENCE ON COMMUNICATIONS, COMPUTERS AND SIGNAL PROCESSING (PACRIM), 2013, : 177 - 182