Detection of Hardware Trojans in Third-Party Intellectual Property Using Untrusted Modules

被引:11
|
作者
Reece, Trey [1 ]
Robinson, William H. [1 ]
机构
[1] Vanderbilt Univ, Dept Elect Engn & Comp Sci, Secur & Fault Tolerance Res Grp, 221 Kirkland Hall, Nashville, TN 37235 USA
基金
美国国家科学基金会;
关键词
Circuit Synthesis; design methodology; formal verification; security; TAXONOMY;
D O I
10.1109/TCAD.2015.2459038
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
During the design of an integrated circuit, there are several opportunities for adversaries to make malicious modifications or insertions to a design. These attacks, known as hardware Trojans, can have catastrophic effects on a circuit if left undetected. This paper describes a technique for identifying hardware Trojans with logic-based payloads that are hidden within third-party intellectual property. Through comparison of two similar but untrusted designs, functional differences can be identified for all possible input combinations within a window of time. This technique was tested on multiple Trojan benchmarks and was found to be very effective, both in detectability and in speed of testing. As this technique has very low costs to implement, it represents an easy way for designers to gain a level of trust in previously untrusted designs.
引用
收藏
页码:357 / 366
页数:10
相关论文
共 50 条
  • [21] Third-party transfers in WLCG using HTTP
    Bockelman, Brian
    Ceccanti, Andrea
    Furano, Fabrizio
    Millar, Paul
    Litvintsev, Dmitry
    Forti, Alessandra
    24TH INTERNATIONAL CONFERENCE ON COMPUTING IN HIGH ENERGY AND NUCLEAR PHYSICS (CHEP 2019), 2020, 245
  • [22] Measuring Robustness of Side Channel Analysis in the Detection of Hardware Trojans in Encryption Modules
    Masand, Shruti
    Fernandes, Keith R.
    Bhat, M. S.
    2022 IEEE 19TH INDIA COUNCIL INTERNATIONAL CONFERENCE, INDICON, 2022,
  • [23] Detecting Hardware Trojans Inserted by Untrusted Foundry Using Physical Inspection and Advanced Image Processing
    Nidish Vashistha
    M. Tanjidur Rahman
    Haoting Shen
    Damon L. Woodard
    Navid Asadizanjani
    Mark Tehranipoor
    Journal of Hardware and Systems Security, 2018, 2 (4) : 333 - 344
  • [24] Measuring Robustness of Side Channel Analysis in the Detection of Hardware Trojans in Encryption Modules
    Masand, Shruti
    Fernandes, Keith R
    Bhat, M.S.
    INDICON 2022 - 2022 IEEE 19th India Council International Conference, 2022,
  • [25] Ensuring Trust of Third-Party Hardware Design with Constrained Sequential Equivalence Checking
    Shrestha, Gyanendra
    Hsiao, Michael S.
    2012 IEEE INTERNATIONAL CONFERENCE ON TECHNOLOGIES FOR HOMELAND SECURITY, 2012, : 7 - 12
  • [26] The Risk of Outsourcing: Hidden SCA Trojans in Third-Party IP-Cores Threaten Cryptographic ICs
    Knichel, David
    Moos, Thorben
    Moradi, Amir
    2020 IEEE EUROPEAN TEST SYMPOSIUM (ETS 2020), 2020,
  • [27] On the Effect of Using Third-Party Clouds for Maximizing Profit
    Lee, Young Choon
    Wang, Chen
    Taheri, Javid
    Zomaya, Albert Y.
    Zhou, Bing Bing
    ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, PT 1, PROCEEDINGS, 2010, 6081 : 381 - +
  • [28] Using third-party certification to market forest products
    Knudsen, J
    STRUCTURAL CHANGES WITHIN THE GLOBAL FORESTRY SECTOR, 1997, : 72 - 77
  • [29] A Systematic Assessment on Android Third-Party Library Detection Tools
    Zhan, Xian
    Liu, Tianming
    Liu, Yepang
    Liu, Yang
    Li, Li
    Wang, Haoyu
    Luo, Xiapu
    IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2022, 48 (11) : 4249 - 4273
  • [30] LibSift: Automated Detection of Third-Party Libraries in Android Applications
    Soh, Charlie
    Tan, Hee Beng Kuan
    Arnatovich, Yauhen Leanidavich
    Narayanan, Annamalai
    Wang, Lipo
    2016 23RD ASIA-PACIFIC SOFTWARE ENGINEERING CONFERENCE (APSEC 2016), 2016, : 41 - 48