Hardware Trojan Detection Based on Logical Testing

被引:23
作者
Bazzazi, Amin [1 ]
Shalmani, Mohammad Taghi Manzuri [2 ]
Hemmatyar, Ali Mohammad Afshin [2 ]
机构
[1] Sharif Univ Technol, Sch Sci & Engn, Int Campus, Kish Island, Iran
[2] Sharif Univ Technol, Comp Fac, Dept Comp Engn, Tehran, Iran
来源
JOURNAL OF ELECTRONIC TESTING-THEORY AND APPLICATIONS | 2017年 / 33卷 / 04期
关键词
Hardware security; Hardware Trojans; Trojan localization; Detection methods; Runtime; Logic testing;
D O I
10.1007/s10836-017-5670-0
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In recent years, hardware Trojans (HTs) have become one of the main challenging concerns within the chain of manufacturing digital integrated circuit chips. Because of their diversity in chips, HTs are difficult to detect and locate. This paper attempted to propose a new improved method for detection and localization of HTs based on the real-time logical values of nodes. The algorithm extracts the nodes with special attributes. At the next stage, the nodes with the greatest similarity in terms of logical value are selected as targets. Depending on the size of the circuit, the extraction continues until a sufficient number of similar nodes has been selected. The logical relationship between the candidate nodes yields a function, the logical values of which differ in the Trojan-free and Trojan-infected modes, thus detecting the potential Trojans. This method is scalable, overcoming the problems of noise and Process variation. The success rate of Trojan detection in this method is more than 80%. The most overhead is 13% for power consumption and 15% for area.
引用
收藏
页码:381 / 395
页数:15
相关论文
共 24 条
  • [1] A Cost Effective Approach for Online Error Detection Using Invariant Relationships
    Alves, Nuno
    Buben, Alison
    Nepal, Kundan
    Dworak, Jennifer
    Bahar, R. Iris
    [J]. IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2010, 29 (05) : 788 - 801
  • [2] [Anonymous], 2009, P 5 ANN WORKSH CYB S
  • [3] A Novel Sustained Vector Technique for the Detection of Hardware Trojans
    Banga, Mainak
    Hsiao, Michael S.
    [J]. 22ND INTERNATIONAL CONFERENCE ON VLSI DESIGN HELD JOINTLY WITH 8TH INTERNATIONAL CONFERENCE ON EMBEDDED SYSTEMS, PROCEEDINGS, 2009, : 327 - 332
  • [4] Hardware Trojan Attacks: Threat Analysis and Countermeasures
    Bhunia, Swarup
    Hsiao, Michael S.
    Banga, Mainak
    Narasimhan, Seetharam
    [J]. PROCEEDINGS OF THE IEEE, 2014, 102 (08) : 1229 - 1247
  • [5] OS Support for Detecting Trojan Circuit Attacks
    Bloom, Gedare
    Narahari, Bhagirath
    Simha, Rahul
    [J]. 2009 IEEE INTERNATIONAL WORKSHOP ON HARDWARE-ORIENTED SECURITY AND TRUST, 2009, : 100 - 103
  • [6] Providing secure execution environments with a last line of defense against Trojan circuit attacks
    Bloom, Gedare
    Narahari, Bhagirath
    Simha, Rahul
    Zambreno, Joseph
    [J]. COMPUTERS & SECURITY, 2009, 28 (07) : 660 - 669
  • [7] Chakraborty RS, 2009, LECT NOTES COMPUT SC, V5747, P396
  • [8] Overcoming an Untrusted Computing Base: Detecting and Removing Malicious Hardware Automatically
    Hicks, Matthew
    Finnicum, Murph
    King, Samuel T.
    Martin, Milo M. K.
    Smith, Jonathan M.
    [J]. 2010 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, 2010, : 159 - 172
  • [9] Hardware Trojans: current challenges and approaches
    Jacob, Nisha
    Merli, Dominik
    Heyszl, Johann
    Sigl, Georg
    [J]. IET COMPUTERS AND DIGITAL TECHNIQUES, 2014, 8 (06) : 264 - 273
  • [10] Randomization Based Probabilistic Approach to Detect Trojan Circuits
    Jha, Susmit
    Jha, Sumit Kumar
    [J]. 11TH IEEE HIGH ASSURANCE SYSTEMS ENGINEERING SYMPOSIUM, PROCEEDINGS, 2008, : 117 - +