Simulation for strategic hardware Trojans testing

被引:0
|
作者
机构
[1] Kwiat, Kevin
[2] Born, Frank
来源
| 2018年 / Nelson Publishing Inc.卷 / 57期
关键词
D O I
暂无
中图分类号
学科分类号
摘要
The increasing complexity of microcircuits, coupled with fabless manufacturing, have ushered in more possibilities for tiny hardware Trojans to be introduced during an IC's design or fabrication stages. Tools for generating test vectors assume a fault model. A model is presented where the inputs and outputs of an IC's gates are the fault sites. At these sites, stuck-at faults can occur such that an input or an output is either stuck-at-0 or stuck-at-1. For the three wires (A, B, and C) associated with this AND gate, five more stuck-at faults remain: C stuck-at-0, A stuck-at-0, A stuck-at-1, B stuck-at-0, and B stuck-at-1. In the presence of the hardware Trojan's two gates the circuit's functionality can change dramatically. The payload is triggered when the output of the NOR gate goes high. This causes the XOR gate to invert the AND gate's attempt to set BUS-SEL low. Instead of BUS-SEL being low, the resultant BUSSEL signal would go high-creating, as intended by the attacker, haphazard functionality for the circuit. Based on a game theory engine, the simulator considers the attacker’s and tester's strategies and utilities (cost and payoffs). It can display the ensuing game in matrix notation that allows tracking the attacker's possible actions and the accompanying utility of each action.
引用
收藏
相关论文
共 50 条
  • [41] Strategic Hardware Trojan Testing with Hierarchical Trojan Types
    Brahma, Swastik
    Nan, Satyaki
    Njilla, Laurent
    2021 55TH ANNUAL CONFERENCE ON INFORMATION SCIENCES AND SYSTEMS (CISS), 2021,
  • [42] Identify Hardware Trojans Based on Delay Feature
    Song T.
    Huang Z.
    Yan A.
    Jisuanji Fuzhu Sheji Yu Tuxingxue Xuebao/Journal of Computer-Aided Design and Computer Graphics, 2022, 34 (04): : 515 - 521
  • [43] Design and analysis of hardware Trojans in approximate circuits
    Dou, Yuqin
    Wang, Chenghua
    Gu, Chongyan
    O'Neill, Maire
    Liu, Weiqiang
    ELECTRONICS LETTERS, 2022, 58 (05) : 197 - 199
  • [44] Detecting Hardware Trojans: A Tale of Two Techniques
    Malik, Sharad
    PROCEEDINGS OF THE 15TH CONFERENCE ON FORMAL METHODS IN COMPUTER-AIDED DESIGN (FMCAD 2015), 2015, : 6 - 6
  • [45] Test Pattern Superposition to Detect Hardware Trojans
    Nigh, Chris
    Orailoglu, Alex
    PROCEEDINGS OF THE 2020 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION (DATE 2020), 2020, : 25 - 30
  • [46] Hardware Trojans in Chips: A Survey for Detection and Prevention
    Dong, Chen
    Xu, Yi
    Liu, Ximeng
    Zhang, Fan
    He, Guorong
    Chen, Yuzhong
    SENSORS, 2020, 20 (18) : 1 - 37
  • [47] Hardware Trojans in Quantum Circuits, Their Impacts, and Defense
    Roy, Rupshali
    Das, Subrata
    Ghosh, Swaroop
    2024 25TH INTERNATIONAL SYMPOSIUM ON QUALITY ELECTRONIC DESIGN, ISQED 2024, 2024,
  • [48] Benchmarking of Hardware Trojans and Maliciously Affected Circuits
    Bicky Shakya
    Tony He
    Hassan Salmani
    Domenic Forte
    Swarup Bhunia
    Mark Tehranipoor
    Journal of Hardware and Systems Security, 2017, 1 (1) : 85 - 102
  • [49] Constructing formal verification models for hardware Trojans
    Shen L.
    Mu D.
    Cao G.
    Xie G.
    Shu F.
    Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2021, 48 (03): : 146 - 154
  • [50] A Resizing Method to Minimize Effects of Hardware Trojans
    Cha, Byeongju
    Gupta, Sandeep K.
    2014 IEEE 23RD ASIAN TEST SYMPOSIUM (ATS), 2014, : 192 - 199