A Process for the Detection of Design-Level Hardware Trojans Using Verification Methods

被引:8
|
作者
Krieg, Christian [1 ]
Rathmair, Michael [1 ]
Schupfer, Florian [1 ]
机构
[1] Vienna Univ Technol, Inst Comp Technol, Vienna, Austria
关键词
D O I
10.1109/HPCC.2014.112
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Hardware Trojans have emerged as a serious threat the past years. Several methods to detect possible hardware Trojans have been published, most of them aiming at detection during post-fabrication tests. Nevertheless, hardware Trojans are more probable to be inserted at design-level, as resources required to do so are much lower than those at fabrication. At design-level, verification methods have been shown to serve for Trojan detection. In this paper, we propose a design process to utilize verification methods in hardware Trojan detection, being able to be integrated into a state-of-the-art design flow for embedded systems. We outline the fundamental basics of verification methods and go then into the details of each step in the process. We identify assets and attackers, and outline which methods are suited to defend against which type of attack.
引用
收藏
页码:729 / 734
页数:6
相关论文
共 50 条
  • [1] From Secure Business Process Modeling to Design-Level Security Verification
    Ramadan, Qusai
    Salnitri, Mattia
    Strueber, Daniel
    Juerjens, Jan
    Giorgini, Paolo
    2017 ACM/IEEE 20TH INTERNATIONAL CONFERENCE ON MODEL DRIVEN ENGINEERING LANGUAGES AND SYSTEMS (MODELS 2017), 2017, : 123 - 133
  • [2] A Survey on Recent Detection Methods of the Hardware Trojans
    Naveenkumar, R.
    Sivamangai, N. M.
    Napolean, A.
    Janani, V
    ICSPC'21: 2021 3RD INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND COMMUNICATION (ICPSC), 2021, : 139 - 143
  • [3] Towards bidirectional LUT-level detection of hardware Trojans
    Cho, Mingi
    Jang, Jaedong
    Seo, Yezee
    Jeong, Seyeon
    Chung, Soochang
    Kwon, Taekyoung
    COMPUTERS & SECURITY, 2021, 104
  • [4] Design of AI Trojans for Evading Machine Learning-based Detection of Hardware Trojans
    Pan, Zhixin
    Mishra, Prabhal
    PROCEEDINGS OF THE 2022 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION (DATE 2022), 2022, : 682 - 687
  • [5] Design of AI Trojans for Evading Machine Learning-based Detection of Hardware Trojans
    Pan, Zhixin
    Mishra, Prabhat
    Proceedings of the 2022 Design, Automation and Test in Europe Conference and Exhibition, DATE 2022, 2022, : 682 - 687
  • [6] Design-level Detection of Interactions in Aspect-UML models using Alloy
    Mostefaoui, Farida
    Vachon, Julie
    JOURNAL OF OBJECT TECHNOLOGY, 2007, 6 (07): : 137 - 165
  • [7] Assume-guarantee verification of source code with design-level assumptions
    Giannakopoulou, D
    Pasareanu, CS
    Cobleigh, JM
    ICSE 2004: 26TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, PROCEEDINGS, 2004, : 211 - 220
  • [8] Hardware Trojans Detection at Register Transfer Level Based on Machine Learning
    Han, Tao
    Wang, Yuze
    Liu, Peng
    2019 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2019,
  • [9] On the Detection of Always-on Hardware Trojans Supported by a Pre-Silicon Verification Methodology
    Ruospo, Annachiara
    Sanchez, Ernesto
    2019 20TH INTERNATIONAL WORKSHOP ON MICROPROCESSOR/SOC TEST, SECURITY AND VERIFICATION (MTV 2019), 2019, : 25 - 30
  • [10] A hardware Trojans design using the correlation analysis of electromagnetic emanation
    Zhang, Peng
    Zou, Cheng
    Deng, Gaoming
    Chen, Kaiyan
    Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition), 2010, 38 (10): : 22 - 25