Detection of Hardware Trojans in Third-Party Intellectual Property Using Untrusted Modules

被引:11
|
作者
Reece, Trey [1 ]
Robinson, William H. [1 ]
机构
[1] Vanderbilt Univ, Dept Elect Engn & Comp Sci, Secur & Fault Tolerance Res Grp, 221 Kirkland Hall, Nashville, TN 37235 USA
基金
美国国家科学基金会;
关键词
Circuit Synthesis; design methodology; formal verification; security; TAXONOMY;
D O I
10.1109/TCAD.2015.2459038
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
During the design of an integrated circuit, there are several opportunities for adversaries to make malicious modifications or insertions to a design. These attacks, known as hardware Trojans, can have catastrophic effects on a circuit if left undetected. This paper describes a technique for identifying hardware Trojans with logic-based payloads that are hidden within third-party intellectual property. Through comparison of two similar but untrusted designs, functional differences can be identified for all possible input combinations within a window of time. This technique was tested on multiple Trojan benchmarks and was found to be very effective, both in detectability and in speed of testing. As this technique has very low costs to implement, it represents an easy way for designers to gain a level of trust in previously untrusted designs.
引用
收藏
页码:357 / 366
页数:10
相关论文
共 50 条
  • [31] Measurement and Early Detection of Third-Party Application Abuse on Twitter
    Farooqi, Shehroze
    Shafiq, Zubair
    WEB CONFERENCE 2019: PROCEEDINGS OF THE WORLD WIDE WEB CONFERENCE (WWW 2019), 2019, : 448 - 458
  • [32] Third-Party Authentication Using Secure-Engine
    Chouthe, Esha
    Ezekiel, Evangelin
    Krishnan, H. S. Sivaram
    Kajani, Devansh
    Rathod, S. B.
    2018 FOURTH INTERNATIONAL CONFERENCE ON COMPUTING COMMUNICATION CONTROL AND AUTOMATION (ICCUBEA), 2018,
  • [33] A Third-party Extension Support Framework Using Patterns
    Hao, Yiyang
    Washizaki, Hironori
    Fukazawa, Yoshiaki
    2015 22ND ASIA-PACIFIC SOFTWARE ENGINEERING CONFERENCE (APSEC 2015), 2015, : 198 - 205
  • [34] Evaluating Third-Party Bad Neighborhood Blacklists for Spam Detection
    Moura, Giovane C. M.
    Sperotto, Anna
    Sadre, Ramin
    Pras, Aiko
    2013 IFIP/IEEE INTERNATIONAL SYMPOSIUM ON INTEGRATED NETWORK MANAGEMENT (IM 2013), 2013, : 252 - 259
  • [35] CHAL 47-Protecting your intellectual property against third party infringers and third party patents
    McCauley, Robert F., III
    ABSTRACTS OF PAPERS OF THE AMERICAN CHEMICAL SOCIETY, 2006, 232
  • [36] Toward Automatic Proof Generation for Information Flow Policies in Third-Party Hardware IP
    Bidmeshki, Mohammad-Mahdi
    Makris, Yiorgos
    2015 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST), 2015, : 163 - 168
  • [37] The role of the aggregator: using third-party suppliers to reach the market
    Marlow, Martin
    LEARNED PUBLISHING, 2010, 23 (04) : 357 - 361
  • [38] Large-Scale Third-Party Library Detection in Android Markets
    Li, Menghao
    Wang, Pei
    Wang, Wei
    Wang, Shuai
    Wu, Dinghao
    Liu, Jian
    Xue, Rui
    Huo, Wei
    Zou, Wei
    IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2020, 46 (09) : 981 - 1003
  • [39] Using HCV Infected Organs and the Challenge of Third-Party Payers
    Daloul, R.
    Michaels, A.
    Sobotka, L.
    Pesavento, T.
    Washburn, K.
    AMERICAN JOURNAL OF TRANSPLANTATION, 2020, 20 : 582 - 582
  • [40] Measuring Personal Privacy Breaches Using Third-Party Trackers
    Shuford, Erica
    Kavanaugh, Tara
    Ralph, Brian
    Ceesay, Ebrima
    Watters, Paul A.
    2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE), 2018, : 1615 - 1618