Trigger Identification Using Difference-Amplified Controllability and Dynamic Transition Probability for Hardware Trojan Detection

被引:18
作者
Huang, Kai [1 ]
He, Yun [1 ]
机构
[1] Zhejiang Univ, Coll Elect Engn, Hangzhou 310027, Peoples R China
关键词
Trojan horses; Integrated circuit modeling; Controllability; Hardware; Fabrication; Foundries; Hardware Trojan; static probability analysis; dynamic probability analysis; difference-amplified controllability; k-means clustering;
D O I
10.1109/TIFS.2019.2946044
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
To remain dormant in the validation and manufacturing test, Trojans tend to have at least one trigger signal at the gate-level netlist with a very low transition probability. Our paper exploits this stealthy nature of trigger signals to detect Trojans using static and dynamic transition probabilities. The proposed trigger identification is a reference-free scheme, and no prior knowledge of a Trojan-free design is required. First, we reveal the relation between combinational 0/1-controllability and 0/1-probability and propose a static transition probability analysis based on our proposed difference-amplified controllability, which can be easily obtained by the Sandia Controllability/Observability Analysis Program. The k-means clustering method is adopted for potential trigger classification to extend the scalability and adaptability to different circuit sizes. Second, we propose to utilize the transition probability of a dynamic simulation for correction of the results. Experiments show that the proposed detection scheme can obtain a 0% false negative rate and a maximum 11.7% false positive rate on Trust-HUB benchmarks.
引用
收藏
页码:3387 / 3400
页数:14
相关论文
共 51 条
  • [1] Examining the Link Between Issue Attitudes and News Source: The Case of Latinos and Immigration Reform
    Abrajano, Marisa
    Singh, Simran
    [J]. POLITICAL BEHAVIOR, 2009, 31 (01) : 1 - 30
  • [2] Acharya A, 2009, INT CONF PERVAS COMP, P11
  • [3] The hunt for the kill switch
    Adee, Sally
    [J]. IEEE SPECTRUM, 2008, 45 (05) : 34 - 39
  • [4] System-level protection and hardware Trojan detection using weighted voting
    Amin, Hany A. M.
    Alkabani, Yousra
    Selim, Gamal M. I.
    [J]. JOURNAL OF ADVANCED RESEARCH, 2014, 5 (04) : 499 - 505
  • [5] [Anonymous], 2014, 2014 51 ACM EDAC IEE
  • [6] [Anonymous], IEEE T COMPUT AIDED
  • [7] [Anonymous], IEEE T EMERG TOPICS
  • [8] [Anonymous], 2018, Journal of Hardware and Systems Security
  • [9] Banga M., 2011, 2011 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), P18, DOI 10.1109/HST.2011.5954989
  • [10] On Reverse Engineering-Based Hardware Trojan Detection
    Bao, Chongxi
    Forte, Domenic
    Srivastava, Ankur
    [J]. IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2016, 35 (01) : 49 - 57