A security method of hardware Trojan detection using path tracking algorithm

被引:3
|
作者
Huang, Der-Chen [1 ]
Hsiao, Chun-Fang [1 ]
Chang, Tin-Wei [1 ]
Chu, Ying-Yi [2 ]
机构
[1] Natl Chung Hsing Univ, Dept Comp Sci & Engn, Taichung, Taiwan
[2] Natl Chin Yi Univ Technol, Dept Elect Engn, Taichung, Taiwan
关键词
Security; Hardware Trojans; Malicious activity; Attack detection; Algorithm;
D O I
10.1186/s13638-022-02165-9
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Recently, the issue of malicious circuit alteration and attack draws more attention than ever before due to the globalization of IC design and manufacturing. Malicious circuits, also known as hardware Trojans, are found able to degrade the circuit performance or even leak confidential information, and accordingly it is definitely an issue of immediate concern to develop detection techniques against hardware Trojans. This paper presents a ring oscillator-based detection technique to improve the hardware Trojan detection performance. A circuit under test is divided into a great number of blocks, path assignment is optimized using a path tracking algorithm, and a high coverage is reached accordingly.
引用
收藏
页数:21
相关论文
共 50 条
  • [1] A security method of hardware Trojan detection using path tracking algorithm
    Der-Chen Huang
    Chun-Fang Hsiao
    Tin-Wei Chang
    Ying-Yi Chu
    EURASIP Journal on Wireless Communications and Networking, 2022
  • [2] Hardware Trojan detection using path delay fingerprint
    Jin, Yier
    Makris, Yiorgos
    2008 IEEE INTERNATIONAL WORKSHOP ON HARDWARE-ORIENTED SECURITY AND TRUST, 2008, : 51 - +
  • [3] Hardware Trojan Detection Using the Order of Path Delay
    Cui, Xiaotong
    Koopahi, Elnaz
    Wu, Kaijie
    Karri, Ramesh
    ACM JOURNAL ON EMERGING TECHNOLOGIES IN COMPUTING SYSTEMS, 2018, 14 (03)
  • [4] Detection of Hardware Trojan in SEA Using Path Delay
    Kumar, Prasanna
    Srinivasan, Ramasamy
    2014 IEEE STUDENTS' CONFERENCE ON ELECTRICAL, ELECTRONICS AND COMPUTER SCIENCE (SCEECS), 2014,
  • [5] Detection and analysis of hardware trojan using scan chain method
    Rithesh, M.
    Ram, Bhargav B., V
    Harish, G.
    Yellampalli, Siva
    2015 19TH INTERNATIONAL SYMPOSIUM ON VLSI DESIGN AND TEST (VDAT), 2015,
  • [6] Hardware Trojan Detection By Symmetry Breaking In Path Delays
    Yoshimizu, Norimasa
    2014 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE-ORIENTED SECURITY AND TRUST (HOST), 2014, : 107 - 111
  • [7] CRC-Based Hardware Trojan Detection for Improved Hardware Security
    Mohankumar, N.
    Jayakumar, M.
    Nirmala Devi, M.
    Lecture Notes in Electrical Engineering, 2018, 471 : 381 - 389
  • [8] A Threshold based Hardware Trojan Detection Technique Using XGBoost Algorithm
    Das, Ranit
    Dhar, Tapobrata
    Roy, Surajit Kumar
    2022 IEEE INTERNATIONAL TEST CONFERENCE INDIA (ITC INDIA), 2022,
  • [9] Using Path Features for Hardware Trojan Detection Based on Machine Learning Techniques
    Yen, Chia-Heng
    Tsai, Jung-Che
    Wu, Kai-Chiang
    2023 24TH INTERNATIONAL SYMPOSIUM ON QUALITY ELECTRONIC DESIGN, ISQED, 2023, : 638 - 645
  • [10] A New Testing Method for Hardware Trojan Detection
    Nejadmoghadam, Fahimeh
    Mahani, Ali
    Kavian, Yousef S.
    CONFERENCE ON ELECTRONICS, TELECOMMUNICATIONS AND COMPUTERS - CETC 2013, 2014, 17 : 713 - 719