Hardware Trojan Horse Detection through Improved Switching of Dormant Nets

被引:5
作者
Dhar, Tapobrata [1 ,2 ]
Roy, Surajit Kumar [1 ,2 ]
Giri, Chandan [1 ,2 ]
机构
[1] Indian Inst Engn Sci & Technol, Sibpur, India
[2] Bot Garden, Howrah 711103, W Bengal, India
关键词
Hardware trojan horses; clustering; design for security; transition probability; SIDE-CHANNEL;
D O I
10.1145/3439951
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Covert Hardware Trojan Horses (HTH) introduced by malicious attackers during the fabless manufacturing process of integrated circuits (IC) have the potential to cause malignant functions within the circuit. This article employs a Design-for-Security technique to detect any HTHs present in the circuit by inserting tri-state buffers (TSB) in the ICs that inject the internal nets with weighted logic values during the test phase. This increases the transitions in the logic values of the nets within the IC, thereby stimulating any inserted HTH circuits. The TSBs are efficiently inserted in the IC considering various circuit parameters and testability measures to bolster the transitions in logic values of the nets throughout the IC while minimising the area overhead. Simulation results show a significant increase in transitions in logic values within HTH triggers using this method, thus aiding in their detection through side-channel analysis or direct activation of the payload.
引用
收藏
页数:22
相关论文
共 29 条
[1]   Detecting Trojans Through Leakage Current Analysis Using Multiple Supply Pad IDDQs [J].
Aarestad, Jim ;
Acharyya, Dhruva ;
Rad, Reza ;
Plusquellic, Jim .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2010, 5 (04) :893-904
[2]   A region based approach for the identification of hardware Trojans [J].
Banga, Mainak ;
Hsiao, Michael S. .
2008 IEEE INTERNATIONAL WORKSHOP ON HARDWARE-ORIENTED SECURITY AND TRUST, 2008, :40-47
[3]   A Novel Sustained Vector Technique for the Detection of Hardware Trojans [J].
Banga, Mainak ;
Hsiao, Michael S. .
22ND INTERNATIONAL CONFERENCE ON VLSI DESIGN HELD JOINTLY WITH 8TH INTERNATIONAL CONFERENCE ON EMBEDDED SYSTEMS, PROCEEDINGS, 2009, :327-332
[4]   On Reverse Engineering-Based Hardware Trojan Detection [J].
Bao, Chongxi ;
Forte, Domenic ;
Srivastava, Ankur .
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2016, 35 (01) :49-57
[5]   Hardware Trojan Attacks: Threat Analysis and Countermeasures [J].
Bhunia, Swarup ;
Hsiao, Michael S. ;
Banga, Mainak ;
Narasimhan, Seetharam .
PROCEEDINGS OF THE IEEE, 2014, 102 (08) :1229-1247
[6]  
Chakraborty RS, 2009, LECT NOTES COMPUT SC, V5747, P396
[7]   Hardware Trojan Detection using ATPG and Model Checking [J].
Cruz, Jonathan ;
Farahmandi, Farimah ;
Ahmed, Alif ;
Mishra, Prabhat .
2018 31ST INTERNATIONAL CONFERENCE ON VLSI DESIGN AND 2018 17TH INTERNATIONAL CONFERENCE ON EMBEDDED SYSTEMS (VLSID & ES), 2018, :91-96
[8]   Hardware Trojan Detection by Stimulating Transitions in Rare Nets [J].
Dhar, Tapobrata ;
Roy, Surajit Kumar ;
Giri, Chandan .
2019 32ND INTERNATIONAL CONFERENCE ON VLSI DESIGN AND 2019 18TH INTERNATIONAL CONFERENCE ON EMBEDDED SYSTEMS (VLSID), 2019, :537-538
[9]  
Du DD, 2010, LECT NOTES COMPUT SC, V6225, P173, DOI 10.1007/978-3-642-15031-9_12
[10]  
Goldstein L. H., 1980, Proceedings of the 17th Design Automation Conference, P190, DOI 10.1145/800139.804528