New Testing Procedure for Finding Insertion Sites of Stealthy Hardware Trojans

被引:0
|
作者
Dupuis, Sophie [1 ]
Ba, Papa-Sidy [1 ]
Flottes, Marie-Lise [1 ]
Di Natale, Giorgio [1 ]
Rouzeyre, Bruno [1 ]
机构
[1] Univ Montpellier 2, CNRS, LIRMM, UMR 5506, Montpellier, France
来源
2015 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION (DATE) | 2015年
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Hardware Trojans (HTs) are malicious alterations to a circuit. These modifications can be inserted either during the design phase or during the fabrication process. Due to the diversity of Hardware Trojans, detecting and/or locating them are challenging tasks. Numerous approaches have been proposed to address this problem. Methods based on logic testing consist in trying to activate potential HTs and detect erroneous outputs during test. However, HTs are stealthy in nature i.e. mostly inactive unless they are triggered by a very rare condition. The activation of a HT is therefore a major challenge. In this paper, we propose a new testing procedure dedicated to identifying where a possible HT may be easily inserted and generating the test patterns that are able to excite these sites. The selection of the sites is based on the assumption that the HT (i) is triggered by signals with low controllability, (ii) combines them using gates in close proximity in the circuit's layout, and (iii) without introducing new gates in critical paths.
引用
收藏
页码:776 / 781
页数:6
相关论文
共 50 条
  • [21] Summary of Locating Hardware Trojans using Combinatorial Testing for Cryptographic Circuits
    Kampel, Ludwig
    Kitsos, Paris
    Simos, Dimitris E.
    2023 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE TESTING, VERIFICATION AND VALIDATION WORKSHOPS, ICSTW, 2023, : 260 - 262
  • [22] Hardware Trojans Hidden in RTL Don't Cares - Automated Insertion and Prevention Methodologies
    Fern, Nicole
    Kulkarni, Shrikant
    Cheng, Kwang-Ting
    2015 IEEE INTERNATIONAL TEST CONFERENCE (ITC), 2015,
  • [23] Detecting Hardware Trojans Using Combined Self-Testing and Imaging
    Vashistha, Nidish
    Lu, Hangwei
    Shi, Qihang
    Woodard, Damon L.
    Asadizanjani, Navid
    Tehranipoor, Mark M.
    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2022, 41 (06) : 1730 - 1743
  • [24] Identification of Stealthy Hardware Trojans through On-Chip Temperature Sensing and an Autoencoder-Based Machine Learning Algorithm
    Gourousis, Thomas
    Zhang, Ziyue
    Yan, Mengting
    Zhang, Millin
    Mittal, Ankit
    Shrivastava, Aatmesh
    Restuccia, Francesco
    Fei, Yunsi
    Onabajo, Marvin
    Midwest Symposium on Circuits and Systems, 2023, : 30 - 34
  • [25] Low-level implementation and side-channel detection of stealthy hardware trojans on field programmable gate arrays
    Marchand, Cedric
    Francq, Julien
    IET COMPUTERS AND DIGITAL TECHNIQUES, 2014, 8 (06): : 246 - 255
  • [26] Protection Against Hardware Trojans With Logic Testing: Proposed Solutions and Challenges Ahead
    Dupuis, Sophie
    Flottes, Marie-Lise
    Di Natale, Giorgio
    Rouzeyre, Bruno
    IEEE DESIGN & TEST, 2018, 35 (02) : 73 - 90
  • [27] Tuberculin testing as a case finding procedure
    Phelps, PS
    Cenci, VP
    Lawton, A
    JOURNAL OF PEDIATRICS, 1940, 17 : 481 - 482
  • [28] Toward FPGA Security in IoT: A New Detection Technique for Hardware Trojans
    Chen, Zhe
    Guo, Shize
    Wang, Jian
    Li, Yubai
    Lu, Zhonghai
    IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (04) : 7061 - 7068
  • [29] Trojan-D2: Post-Layout Design and Detection of Stealthy Hardware Trojans - a RISC-V Case Study
    Parvin, Sajjad
    Goli, Mehran
    Torres, Frank Sill
    Drechsler, Rolf
    2023 28TH ASIA AND SOUTH PACIFIC DESIGN AUTOMATION CONFERENCE, ASP-DAC, 2023, : 683 - 689
  • [30] New methods for finding common insertion sites and co-occurring common insertion sites in transposon- and virus-based genetic screens
    Bergemann, Tracy L.
    Starr, Timothy K.
    Yu, Haoyu
    Steinbach, Michael
    Erdmann, Jesse
    Chen, Yun
    Cormier, Robert T.
    Largaespada, David A.
    Silverstein, Kevin A. T.
    NUCLEIC ACIDS RESEARCH, 2012, 40 (09) : 3822 - 3833