ForASec: Formal Analysis of Hardware Trojan-Based Security Vulnerabilities in Sequential Circuits

被引:3
|
作者
Khalid, Faiq [1 ]
Abbassi, Imran Hafeez [2 ]
Rehman, Semeen [1 ]
Kamboh, Awais Mehmood [4 ]
Hasan, Osman [3 ,4 ]
Shafique, Muhammad [5 ]
机构
[1] Tech Univ Wien, Inst Comp Engn, A-1040 Vienna, Austria
[2] Natl Univ Sci & Technol, Coll Aeronaut Engn, Islamabad 44000, Pakistan
[3] Univ Jeddah, Coll Comp Sci & Engn, Dept Comp & Network Engn, Jeddah 21589, Saudi Arabia
[4] Natl Univ Sci & Technol, Sch Elect Engn & Comp Sci, Islamabad 44000, Pakistan
[5] New York Univ Abu Dhabi, Div Engn, Abu Dhabi, U Arab Emirates
关键词
Formal verification; gate-level modeling; hardware trojans (HTs); model checking; security vulnerabilities;
D O I
10.1109/TCAD.2021.3061524
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this article, we propose a novel model checking-based methodology that analyzes the hardware trojan (HT)-based security vulnerabilities in sequential circuits with 100% coverage while addressing the state-space explosion issue and completeness issue. In this work, the state-space explosion issue is addressed by efficiently partitioning the larger state space into corresponding smaller state spaces to enable the distributed HT-based security analysis of complex sequential circuits. We analyze multiple ISCAS89 and trust-hub benchmarks for different ASIC technologies, i.e., 65, 45, and 22 nm, to demonstrate the efficacy of our framework in identifying HT-based security vulnerabilities. The experimental results show that ForASec successfully performs the complete analysis of the given complex and large sequential circuits, and provides approximately 6 x-10 x speedup in analysis time compared to the state-of-the-art model checking-based techniques.
引用
收藏
页码:1167 / 1180
页数:14
相关论文
共 50 条
  • [21] Software security vulnerabilities analysis method based on frequent sequential pattern mining and sequence clustering
    Wu, Di
    Ren, Jia-Dong
    ICIC Express Letters, 2014, 8 (08): : 2113 - 2119
  • [22] Security Promises and Vulnerabilities in Emerging Reconfigurable Nanotechnology-Based Circuits
    Rai, Shubham
    Patnaik, Satwik
    Rupani, Ansh
    Knechtel, Johann
    Sinanoglu, Ozgur
    Kumar, Akash
    IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2022, 10 (02) : 763 - 778
  • [23] Hardware Trojan Based Security Issues in Home Area Network: A Testbed Setup
    Mohammed, Hawzhin
    Howell, Jimmy
    Hasan, Syed Rafay
    Guo, Nan
    Khalid, Faiq
    Elkeelany, Omar
    2018 IEEE 61ST INTERNATIONAL MIDWEST SYMPOSIUM ON CIRCUITS AND SYSTEMS (MWSCAS), 2018, : 972 - 975
  • [24] A Power Analysis Based Approach to Detect Trojan Circuits
    Wang, Li-Wei
    Luo, Hong-Wei
    2011 INTERNATIONAL CONFERENCE ON QUALITY, RELIABILITY, RISK, MAINTENANCE, AND SAFETY ENGINEERING (ICQR2MSE), 2011, : 380 - 384
  • [25] Hardware-Trojan Classification based on the Structure of Trigger Circuits Utilizing Random Forests
    Kurihara, Tatsuki
    Togawa, Nozomu
    2021 IEEE 27TH INTERNATIONAL SYMPOSIUM ON ON-LINE TESTING AND ROBUST SYSTEM DESIGN (IOLTS), 2021,
  • [26] Hardware Trojan detection based on self-differential analysis
    Zhang Y.
    Quan H.
    Li X.
    Chen K.
    Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition), 2019, 47 (02): : 98 - 102
  • [27] Hardware Trojan Detection Based on Cluster Analysis of Mahalanobis Distance
    Cui, Qi
    Zhang, Lei
    Sun, Kewang
    Li, Dongxu
    Wang, Sixiang
    2016 8TH INTERNATIONAL CONFERENCE ON INTELLIGENT HUMAN-MACHINE SYSTEMS AND CYBERNETICS (IHMSC), VOL. 1, 2016, : 234 - 238
  • [28] Sensitivity Analysis of Ring Oscillator Based Hardware Trojan Detection
    Qin, Yetai
    Xia, Tongsheng
    2017 17TH IEEE INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY (ICCT 2017), 2017, : 1979 - 1983
  • [29] Statistical Analysis based onTemperature Matrix for Hardware Trojan Detection
    Tang, Yongkang
    Li, Shaoqing
    Fang, Liang
    Chen, Jihua
    PROCEEDINGS OF 2018 IEEE INTERNATIONAL CONFERENCE ON AUTOMATION, ELECTRONICS AND ELECTRICAL ENGINEERING (AUTEEE), 2018, : 143 - 149
  • [30] Hardware Trojan detection method based on combined features analysis
    Zhao Y.
    Li B.
    Ma H.
    He J.
    Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition), 2021, 49 (05): : 1 - 6