Detection of Hardware Trojans in Third-Party Intellectual Property Using Untrusted Modules

被引:11
|
作者
Reece, Trey [1 ]
Robinson, William H. [1 ]
机构
[1] Vanderbilt Univ, Dept Elect Engn & Comp Sci, Secur & Fault Tolerance Res Grp, 221 Kirkland Hall, Nashville, TN 37235 USA
基金
美国国家科学基金会;
关键词
Circuit Synthesis; design methodology; formal verification; security; TAXONOMY;
D O I
10.1109/TCAD.2015.2459038
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
During the design of an integrated circuit, there are several opportunities for adversaries to make malicious modifications or insertions to a design. These attacks, known as hardware Trojans, can have catastrophic effects on a circuit if left undetected. This paper describes a technique for identifying hardware Trojans with logic-based payloads that are hidden within third-party intellectual property. Through comparison of two similar but untrusted designs, functional differences can be identified for all possible input combinations within a window of time. This technique was tested on multiple Trojan benchmarks and was found to be very effective, both in detectability and in speed of testing. As this technique has very low costs to implement, it represents an easy way for designers to gain a level of trust in previously untrusted designs.
引用
收藏
页码:357 / 366
页数:10
相关论文
共 50 条
  • [41] Third-party error detection support mechanisms for dictation speech recognition
    Zhou, Lina
    Shi, Yongmei
    Sears, Andrew
    INTERACTING WITH COMPUTERS, 2010, 22 (05) : 375 - 388
  • [42] Reliable Third-Party Library Detection in Android and its Security Applications
    Backes, Michael
    Bugiel, Sven
    Derr, Erik
    CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 356 - 367
  • [43] LibRadar: Fast and Accurate Detection of Third-party Libraries in Android Apps
    Ma, Ziang
    Wang, Haoyu
    Guo, Yao
    Chen, Xiangqun
    2016 IEEE/ACM 38TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING COMPANION (ICSE-C), 2016, : 653 - 656
  • [44] LibD: Scalable and Precise Third-party Library Detection in Android Markets
    Li, Menghao
    Wang, Wei
    Wang, Pei
    Wang, Shuai
    Wu, Dinghao
    Liu, Jian
    Xue, Rui
    Huo, Wei
    2017 IEEE/ACM 39TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE), 2017, : 335 - 346
  • [45] On the multiple anomaly detection of a third-party monitoring system for secured control
    Sakata, Kousei
    Fujita, Shintaro
    Sawada, Kenji
    Shin, Seiichi
    Maeta, Ippei
    Hosokawa, Shu
    2020 IEEE/SICE INTERNATIONAL SYMPOSIUM ON SYSTEM INTEGRATION (SII), 2020, : 1254 - 1258
  • [46] "The Camera Rolls": Using Third-Party Video in Field Research
    Jones, Nikki
    Raymond, Geoffrey
    ANNALS OF THE AMERICAN ACADEMY OF POLITICAL AND SOCIAL SCIENCE, 2012, 642 : 109 - 123
  • [47] Development of a fiber-optic accelerometer for third-party damage detection
    Nam, Y
    Choi, JB
    Kim, YJ
    Pyo, CR
    ADVANCES IN FRACTURE AND STRENGTH, PTS 1- 4, 2005, 297-300 : 1979 - 1984
  • [48] Automated Third-Party Library Detection for Android Applications: Are We There Yet?
    Zhan, Xian
    Fan, Lingling
    Liu, Tianming
    Chen, Sen
    Li, Li
    Wang, Haoyu
    Xu, Yifei
    Luo, Xiapu
    Liu, Yang
    2020 35TH IEEE/ACM INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING (ASE 2020), 2020, : 919 - 930
  • [49] Third-Party Customization of Residential Internet Sharing using SDN
    Gharakheili, Hassan Habibi
    Exton, Luke
    Sivaraman, Vijay
    Matthews, John
    Russell, Craig
    25TH INTERNATIONAL TELECOMMUNICATION NETWORKS AND APPLICATIONS CONFERENCE (ITNAC 2015), 2015, : 214 - 219
  • [50] The benefits of supply chain integration using a third-party integrator
    Stank, Theodore
    Brzica, Matt
    Ficenec, Jennifer
    TRANSFUSION, 2009, 49 (11) : 2536 - 2538