Translating Circuit Behavior Manifestations of Hardware Trojans using Model Checkers into Run-time Trojan Detection Monitors

被引:0
|
作者
Hasan, Syed Rafay [1 ]
Kamhoua, Charles A. [2 ]
Kwiat, Kevin A. [2 ]
Njilla, Laurent [2 ]
机构
[1] Tennessee Technol Univ, ECE Dept, Cookeville, TN USA
[2] US Air Force, Res Lab, Informat Directorate, Cyber Assurance Branch, Rome, NY USA
关键词
Hardware Trojan; Model Checker; Run-time Monitoring;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
It is a consensus among the researchers, although not proven, that it is close to impossible to guarantee completely secure hardware design. Therefore, it is desired to have run-time hardware Trojan detection techniques. This paper is toward developing a framework of how to achieve run-time hardware Trojan detection units. Although it is difficult to predict the stage of circuit design at which hardware intruder would insert Trojan as well as the hardware Trojan detection methodology that should be applied, behavior patterns of certain design units in the hardware can indicate malicious activities in the design. We propose to translate such behavior patterns using formal verification approaches to establish run-time hardware Trojan detection technique leading which can improve the resiliency of hardware designs against hardware Trojan. We examine the possibility of malicious intrusions in both combinational and sequential circuits that may result in functional incorrectness, and applied our methodology in two example circuits.
引用
收藏
页数:6
相关论文
共 18 条
  • [1] Run-Time Hardware Trojan Detection Using Performance Counters
    Elnaggar, Rana
    Chakrabarty, Krishnendu
    Tahoori, Mehdi B.
    [J]. 2017 IEEE INTERNATIONAL TEST CONFERENCE (ITC), 2017,
  • [2] Hardware Property Checker for Run-Time Hardware Trojan Detection
    Ngo, Xuan Thuy
    Danger, Jean-Luc
    Guilley, Sylvain
    Najm, Zakaria
    Emery, Olivier
    [J]. 2015 EUROPEAN CONFERENCE ON CIRCUIT THEORY AND DESIGN (ECCTD), 2015, : 97 - 100
  • [3] Run-Time Detection of Hardware Trojans: The Processor Protection Unit
    Dubeuf, Jeremy
    Hely, David
    Karri, Ramesh
    [J]. 2013 18TH IEEE EUROPEAN TEST SYMPOSIUM (ETS 2013), 2013,
  • [4] Secure Run-Time Hardware Trojan Detection Using Lightweight Analytical Models
    Amornpaisannon, Burin
    Diavastos, Andreas
    Peh, Li-Shiuan
    Carlson, Trevor E.
    [J]. IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2024, 43 (02) : 431 - 441
  • [5] Temperature Tracking: Toward Robust Run-Time Detection of Hardware Trojans
    Bao, Chongxi
    Forte, Domenic
    Srivastava, Ankur
    [J]. IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2015, 34 (10) : 1577 - 1585
  • [6] Hardware Trojan Detection at Run-time Using Machine-Learning Techniques
    Chakrabarty, Krishnendu
    [J]. 2020 INTERNATIONAL SYMPOSIUM ON VLSI DESIGN, AUTOMATION AND TEST (VLSI-DAT), 2020,
  • [7] Run-Time Monitoring and Validation Using Reverse Function (RMVRF) for Hardware Trojans Detection
    Mohd, Bassam J.
    Abed, Sa'ed
    Hayajneh, Thaier
    Alshayeji, Mohammad H.
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (06) : 2689 - 2704
  • [8] Temperature Tracking: An Innovative Run-Time Approach for Hardware Trojan Detection
    Forte, Domenic
    Bao, Chongxi
    Srivastava, Ankur
    [J]. 2013 IEEE/ACM INTERNATIONAL CONFERENCE ON COMPUTER-AIDED DESIGN (ICCAD), 2013, : 532 - 539
  • [9] RDAMS: An Efficient Run-Time Approach for Memory Fault and Hardware Trojans Detection
    Wang, Jian
    Li, Ying
    [J]. INFORMATION, 2021, 12 (04)
  • [10] LAOCOON: A Run-time Monitoring and Verification Approach for Hardware Trojan Detection
    Danger, Jean-Luc
    Fribourg, Laurent
    Naceur, Maha
    Kuhne, Ulrich
    [J]. 2019 22ND EUROMICRO CONFERENCE ON DIGITAL SYSTEM DESIGN (DSD), 2019, : 269 - 276