ForASec: Formal Analysis of Hardware Trojan-Based Security Vulnerabilities in Sequential Circuits

被引:3
|
作者
Khalid, Faiq [1 ]
Abbassi, Imran Hafeez [2 ]
Rehman, Semeen [1 ]
Kamboh, Awais Mehmood [4 ]
Hasan, Osman [3 ,4 ]
Shafique, Muhammad [5 ]
机构
[1] Tech Univ Wien, Inst Comp Engn, A-1040 Vienna, Austria
[2] Natl Univ Sci & Technol, Coll Aeronaut Engn, Islamabad 44000, Pakistan
[3] Univ Jeddah, Coll Comp Sci & Engn, Dept Comp & Network Engn, Jeddah 21589, Saudi Arabia
[4] Natl Univ Sci & Technol, Sch Elect Engn & Comp Sci, Islamabad 44000, Pakistan
[5] New York Univ Abu Dhabi, Div Engn, Abu Dhabi, U Arab Emirates
关键词
Formal verification; gate-level modeling; hardware trojans (HTs); model checking; security vulnerabilities;
D O I
10.1109/TCAD.2021.3061524
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this article, we propose a novel model checking-based methodology that analyzes the hardware trojan (HT)-based security vulnerabilities in sequential circuits with 100% coverage while addressing the state-space explosion issue and completeness issue. In this work, the state-space explosion issue is addressed by efficiently partitioning the larger state space into corresponding smaller state spaces to enable the distributed HT-based security analysis of complex sequential circuits. We analyze multiple ISCAS89 and trust-hub benchmarks for different ASIC technologies, i.e., 65, 45, and 22 nm, to demonstrate the efficacy of our framework in identifying HT-based security vulnerabilities. The experimental results show that ForASec successfully performs the complete analysis of the given complex and large sequential circuits, and provides approximately 6 x-10 x speedup in analysis time compared to the state-of-the-art model checking-based techniques.
引用
收藏
页码:1167 / 1180
页数:14
相关论文
共 50 条
  • [1] Hardware Security Analysis of Arbiters: Trojan Modeling and Formal Verification
    Ibrahim, Hala
    Azmi, Haytham
    El-Kharashi, M. Watheq
    Safar, Mona
    2023 IFIP/IEEE 31ST INTERNATIONAL CONFERENCE ON VERY LARGE SCALE INTEGRATION, VLSI-SOC, 2023, : 86 - 91
  • [2] Property Based Formal Security Verification for Hardware Trojan Detection
    Qin, Maoyuan
    Hu, Wei
    Mu, Dejun
    Tai, Yu
    2018 IEEE 3RD INTERNATIONAL VERIFICATION AND SECURITY WORKSHOP (IVSW), 2018, : 62 - 67
  • [3] Optimized Lightweight Hardware Trojan-based Fault Attack on DES
    Zhang, Fan
    Zhang, Yiran
    Shi, Shengwen
    Guo, Shize
    Liang, Ziyuan
    Qureshi, Samiya
    Xu, Congyuan
    2018 IEEE 24TH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS (ICPADS 2018), 2018, : 654 - 661
  • [4] Formal Detection Method for Hardware Vulnerabilities and Trojan of Embedded Devices
    Xie Xiaodong
    Li Qingbao
    Niu Xiaopeng
    INTERNATIONAL CONFERENCE ON GRAPHIC AND IMAGE PROCESSING (ICGIP 2012), 2013, 8768
  • [5] XG Boost Algorithm based Hardware Trojan Detection in Hardware Circuits
    Vennila, A.
    Balambigai, S.
    Arulmurugan, A.
    Hema, M.
    Kamali, M.
    Kishore, M.
    2023 5th International Conference on Electrical, Computer and Communication Technologies, ICECCT 2023, 2023,
  • [6] A Hardware Trojan Detection Method Based on Structural Features of Trojan and Host Circuits
    Liu, Qiang
    Zhao, Pengyong
    Chen, Fuqiang
    IEEE ACCESS, 2019, 7 : 44632 - 44644
  • [7] CRC-Based Hardware Trojan Detection for Improved Hardware Security
    Mohankumar, N.
    Jayakumar, M.
    Nirmala Devi, M.
    Lecture Notes in Electrical Engineering, 2018, 471 : 381 - 389
  • [8] An Efficient ML -based Hardware Trojan Localization Framework for RTL Security Analysis
    Fan, Ruchao
    Tang, Yongming
    Sun, Hao
    Liu, Jiyuan
    Li, He
    2024 ACM/IEEE 6TH SYMPOSIUM ON MACHINE LEARNING FOR CAD, MLCAD 2024, 2024,
  • [9] Silicon Based Security for Protection Against Hardware Vulnerabilities
    Shaminder Kaur
    Balwinder Singh
    Harsimranjit Kaur
    Silicon, 2022, 14 : 2421 - 2427
  • [10] Silicon Based Security for Protection Against Hardware Vulnerabilities
    Kaur, Shaminder
    Singh, Balwinder
    Kaur, Harsimranjit
    SILICON, 2022, 14 (05) : 2421 - 2427