New Testing Procedure for Finding Insertion Sites of Stealthy Hardware Trojans

被引:0
|
作者
Dupuis, Sophie [1 ]
Ba, Papa-Sidy [1 ]
Flottes, Marie-Lise [1 ]
Di Natale, Giorgio [1 ]
Rouzeyre, Bruno [1 ]
机构
[1] Univ Montpellier 2, CNRS, LIRMM, UMR 5506, Montpellier, France
来源
2015 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION (DATE) | 2015年
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Hardware Trojans (HTs) are malicious alterations to a circuit. These modifications can be inserted either during the design phase or during the fabrication process. Due to the diversity of Hardware Trojans, detecting and/or locating them are challenging tasks. Numerous approaches have been proposed to address this problem. Methods based on logic testing consist in trying to activate potential HTs and detect erroneous outputs during test. However, HTs are stealthy in nature i.e. mostly inactive unless they are triggered by a very rare condition. The activation of a HT is therefore a major challenge. In this paper, we propose a new testing procedure dedicated to identifying where a possible HT may be easily inserted and generating the test patterns that are able to excite these sites. The selection of the sites is based on the assumption that the HT (i) is triggered by signals with low controllability, (ii) combines them using gates in close proximity in the circuit's layout, and (iii) without introducing new gates in critical paths.
引用
收藏
页码:776 / 781
页数:6
相关论文
共 50 条
  • [1] Advanced Techniques for Designing Stealthy Hardware Trojans
    Tsoutsos, Nektarios Georgios
    Konstantinou, Charalambos
    Maniatakos, Michail
    2014 51ST ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2014,
  • [2] Stealthy dopant-level hardware trojans
    Becker, Georg T.
    Regazzoni, Francesco
    Paar, Christof
    Burleson, Wayne P.
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2013, 8086 LNCS : 197 - 214
  • [3] Stealthy Dopant-Level Hardware Trojans
    Becker, Georg T.
    Regazzoni, Francesco
    Paar, Christof
    Burleson, Wayne P.
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2013, 2013, 8086 : 197 - 214
  • [4] DeMiST: Detection and Mitigation of Stealthy Analog Hardware Trojans
    Oriero, Enahoro
    Khalid, Faiq
    Hasan, Syed Rafay
    PROCEEDINGS OF THE 12TH INTERNATIONAL WORKSHOP ON HARDWARE AND ARCHITECTURAL SUPPORT FOR SECURITY AND PRIVACY, HASP 2023, 2023, : 47 - 55
  • [5] Stealthy dopant-level hardware Trojans: extended version
    Becker, Georg T.
    Regazzoni, Francesco
    Paar, Christof
    Burleson, Wayne P.
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2014, 4 (01) : 19 - 31
  • [6] DeTrust: Defeating Hardware Trust Verification with Stealthy Implicitly-Triggered Hardware Trojans
    Zhang, Jie
    Yuan, Feng
    Xu, Qiang
    CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2014, : 153 - 166
  • [7] An Efficient Technique to Detect Stealthy Hardware Trojans Independent of the Trigger Size
    Sebt, S. M.
    Patooghy, A.
    Beitollahi, H.
    JOURNAL OF ELECTRONIC TESTING-THEORY AND APPLICATIONS, 2019, 35 (06): : 839 - 852
  • [8] An Efficient Technique to Detect Stealthy Hardware Trojans Independent of the Trigger Size
    S. M. Sebt
    A. Patooghy
    H. Beitollahi
    Journal of Electronic Testing, 2019, 35 : 839 - 852
  • [9] Simulation for strategic hardware Trojans testing
    2018, Nelson Publishing Inc. (57):
  • [10] DELTA: DEsigning a steaLthy trigger mechanism for analog hardware Trojans and its detection Analysis
    Gupta, Nishant
    Desai, Mohil Sandip
    Wijtvliet, Mark
    Rai, Shubham
    Kumar, Akash
    PROCEEDINGS OF THE 59TH ACM/IEEE DESIGN AUTOMATION CONFERENCE, DAC 2022, 2022, : 787 - 792