Hardware Trojan Detection and Diagnosis through Synthesis and Validation using Game Theory

被引:0
作者
Sankar, Vaishnavi [1 ]
Devi, Nirmala M. [1 ]
Jayakumar, M. [1 ]
机构
[1] Amrita Vishwa Vidyapeetham, Amrita Sch Engn, Dept Elect & Commun Engn, Coimbatore, Tamil Nadu, India
来源
2022 IEEE 19TH INDIA COUNCIL INTERNATIONAL CONFERENCE, INDICON | 2022年
关键词
Game theory; Static detection; Hardware Trojans; Hardware Trojan detection;
D O I
10.1109/INDICON56171.2022.10040119
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Outsourcing Integrated Circuits(ICs) pave the way for including malicious circuits commonly known as Hardware Trojans. Trojans can be divided into functional and parametric Trojans. Trojans of the first kind are made by adding or removing gates to or from the golden reference design. Trojans of the following type, the golden circuit is modified by decreasing connecting wire's thickness, exposing the chip to radiation, etc. Hardware Trojan detection schemes can be broadly classified into dynamic and static detection schemes depending on whether or not the input stimulus is applied. The proposed method aims to detect functional Trojans using the static detection method. The work proposes a generic, scalable Trojan detection method. The defender does not have the luxury of knowing the type of Trojan the circuit is infected with, making it difficult for accurate detection. In addition, the proposed method does not require propagating the Trojan effect on the output, magnifying the Trojan effect, or any other voting or additional algorithms to accurately detect the Trojan as in previous literature. The proposed method analyses synthesis reports for Trojan detection. Game theory, in addition, aids the defender in optimal decisionmaking. The proposed method has been evaluated on ISCAS'85 and ISCAS'89 circuits. The proffered method detects various types of Trojans of varying complexities in less time and with 100% accuracy.
引用
收藏
页数:5
相关论文
共 13 条
  • [1] Trojan detection using IC fingerprinting
    Agrawal, Dakshi
    Baktir, Selcuk
    Karakoyunlu, Deniz
    Rohatgi, Pankaj
    Sunar, Berk
    [J]. 2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, : 296 - +
  • [2] Enumeration of Nash equilibria for two-player games
    Avis, David
    Rosenberg, Gabriel D.
    Savani, Rahul
    von Stengel, Bernhard
    [J]. ECONOMIC THEORY, 2010, 42 (01) : 9 - 37
  • [3] Hasegawa K, 2016, IEEE INT ON LINE, P203, DOI 10.1109/IOLTS.2016.7604700
  • [4] Jin Y, 2008, 2008 IEEE INTERNATIONAL WORKSHOP ON HARDWARE-ORIENTED SECURITY AND TRUST, P51, DOI 10.1109/HST.2008.4559049
  • [5] A Game-Theoretic Approach for Testing for Hardware Trojans
    Kamhoua, Charles A.
    Zhao, Hong
    Rodriguez, Manuel
    Kwiat, Kevin A.
    [J]. IEEE TRANSACTIONS ON MULTI-SCALE COMPUTING SYSTEMS, 2016, 2 (03): : 199 - 210
  • [6] Karunakaran DK, 2014, 2014 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING TECHNOLOGIES (ICCCNT
  • [7] Priyatharishini M, 2018, 2018 SECOND INTERNATIONAL CONFERENCE ON ADVANCES IN ELECTRONICS, COMPUTERS AND COMMUNICATIONS (ICAECC)
  • [8] A Survey of Hardware Trojan Taxonomy and Detection
    Tehranipoor, Mohammad
    Koushanfar, Farinaz
    [J]. IEEE DESIGN & TEST OF COMPUTERS, 2010, 27 (01): : 10 - 25
  • [9] Trusthub, About us
  • [10] AVATAR: NN-Assisted Variation Aware Timing Analysis and Reporting for Hardware Trojan Detection
    Vakil, Ashkan
    Mirzaeian, Ali
    Homayoun, Houman
    Karimi, Naghmeh
    Sasan, Avesta
    [J]. IEEE ACCESS, 2021, 9 : 92881 - 92900