A Novel ATPG Method to Increase Activation Probability of Hardware Trojan

被引:0
作者
Xu, Tianliang [1 ]
Wang, Chenxu [1 ]
Zhao, Shiyao [1 ]
Zhou, Zhiquan [1 ]
Luo, Min [1 ]
Wang, Xinsheng [1 ]
机构
[1] Harbin Inst Technol, Sch Informat Sci & Engn, Weihai, Peoples R China
来源
2019 IEEE PACIFIC RIM CONFERENCE ON COMMUNICATIONS, COMPUTERS AND SIGNAL PROCESSING (PACRIM) | 2019年
基金
美国国家科学基金会;
关键词
hardware Trojan detection; logic test; N-detect ATPG;
D O I
10.1109/pacrim47961.2019.8985088
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
A hardware Trojan is defined as a malicious, undesired modification hidden in an electronic circuit. Since the logic test has the advantage of being free of process fluctuations and test noise, a logic test is used to test whether the circuit under test contains a hardware Trojan. This paper optimizes N-detect ATPG detection scheme to generate optimized test vectors for logic testing. The simulation results on s5378 and s38417 benchmarks demonstrate that, compared with traditional logic test technique, the test vectors generated by this paper are able to successfully increase activation probability of a hardware Trojan and detect abnormal outputs.
引用
收藏
页数:5
相关论文
共 29 条
  • [1] A New ATPG and Online Monitoring based Technique for Hardware Trojan Detection
    Rathor, Vijaypal Singh
    Sharma, G. K.
    [J]. MICROPROCESSORS AND MICROSYSTEMS, 2023, 101
  • [2] A Novel Approach to Detecting Hardware Trojan Horses
    Zhang, Jia-lin
    Fang, Lei
    Li, Lei
    Zhang, Zi-xuan
    [J]. 2015 8TH INTERNATIONAL SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND DESIGN (ISCID), VOL 1, 2015, : 43 - 46
  • [3] Hardware Trojan Detection using Transition Probability with Minimal Test Vectors
    Mondal, Anindan
    Karmakar, Shubrojyoti
    Mahalat, Mahabub Hasan
    Roy, Suchismita
    Sen, Bibhash
    Chattopadhyay, Anupam
    [J]. ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, 2023, 22 (01)
  • [4] A Hardware Trojan Detection Method Based on the Electromagnetic Leakage
    Zhang, Lei
    Dong, Youheng
    Wang, Jianxin
    Xiao, Chaoen
    Ding, Ding
    [J]. CHINA COMMUNICATIONS, 2019, 16 (12) : 100 - 110
  • [5] A Board-level Hardware Trojan Detection Method
    Zhang, Yang
    Wang, Jian
    Yang, Zhaorui
    [J]. PROCEEDINGS OF 2024 3RD INTERNATIONAL CONFERENCE ON CYBER SECURITY, ARTIFICIAL INTELLIGENCE AND DIGITAL ECONOMY, CSAIDE 2024, 2024, : 11 - 15
  • [6] A Hardware Trojan Detection Method Based on the Electromagnetic Leakage
    Lei Zhang
    Youheng Dong
    Jianxin Wang
    Chaoen Xiao
    Ding Ding
    [J]. 中国通信, 2019, 16 (12) : 100 - 110
  • [7] A Novel Hardware Trojan Detection Method Based on Side-Channel Analysis and PCA Algorithm
    He, Chunhua
    Hou, Bo
    Wang, Liwei
    En, Yunfei
    Xie, Shaofeng
    [J]. PROCEEDINGS OF 2014 10TH INTERNATIONAL CONFERENCE ON RELIABILITY, MAINTAINABILITY AND SAFETY (ICRMS), VOLS I AND II, 2014, : 1043 - 1046
  • [8] Hardware Trojan Detection Method Based on Time Feature of Chip Temperature
    Yang, Lian
    Li, Xiong
    Li, Huan
    [J]. 2020 10TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE (CCWC), 2020, : 1029 - 1032
  • [9] Fault attack hardware Trojan detection method based on ring oscillator
    Bi, Qiangjia
    Wu, Ning
    Zhou, Fang
    Zhang, Jinbao
    Yahya, Muhammad Rehan
    Ge, Fen
    [J]. IEICE ELECTRONICS EXPRESS, 2019, 16 (08)
  • [10] A Hardware Trojan Detection Method Based on Compression Marginal Fisher Analysis
    Wang Xiaohan
    Wang Tao
    Li Xiongwei
    Zhang Yang
    Huang Changyang
    [J]. JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2019, 41 (12) : 3043 - 3050