ForASec: Formal Analysis of Hardware Trojan-Based Security Vulnerabilities in Sequential Circuits

被引:3
|
作者
Khalid, Faiq [1 ]
Abbassi, Imran Hafeez [2 ]
Rehman, Semeen [1 ]
Kamboh, Awais Mehmood [4 ]
Hasan, Osman [3 ,4 ]
Shafique, Muhammad [5 ]
机构
[1] Tech Univ Wien, Inst Comp Engn, A-1040 Vienna, Austria
[2] Natl Univ Sci & Technol, Coll Aeronaut Engn, Islamabad 44000, Pakistan
[3] Univ Jeddah, Coll Comp Sci & Engn, Dept Comp & Network Engn, Jeddah 21589, Saudi Arabia
[4] Natl Univ Sci & Technol, Sch Elect Engn & Comp Sci, Islamabad 44000, Pakistan
[5] New York Univ Abu Dhabi, Div Engn, Abu Dhabi, U Arab Emirates
关键词
Formal verification; gate-level modeling; hardware trojans (HTs); model checking; security vulnerabilities;
D O I
10.1109/TCAD.2021.3061524
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this article, we propose a novel model checking-based methodology that analyzes the hardware trojan (HT)-based security vulnerabilities in sequential circuits with 100% coverage while addressing the state-space explosion issue and completeness issue. In this work, the state-space explosion issue is addressed by efficiently partitioning the larger state space into corresponding smaller state spaces to enable the distributed HT-based security analysis of complex sequential circuits. We analyze multiple ISCAS89 and trust-hub benchmarks for different ASIC technologies, i.e., 65, 45, and 22 nm, to demonstrate the efficacy of our framework in identifying HT-based security vulnerabilities. The experimental results show that ForASec successfully performs the complete analysis of the given complex and large sequential circuits, and provides approximately 6 x-10 x speedup in analysis time compared to the state-of-the-art model checking-based techniques.
引用
收藏
页码:1167 / 1180
页数:14
相关论文
共 50 条
  • [31] Security Against Hardware Trojan Attacks Using Key-Based Design Obfuscation
    Chakraborty, Rajat Subhra
    Bhunia, Swarup
    JOURNAL OF ELECTRONIC TESTING-THEORY AND APPLICATIONS, 2011, 27 (06): : 767 - 785
  • [32] Security Against Hardware Trojan Attacks Using Key-Based Design Obfuscation
    Rajat Subhra Chakraborty
    Swarup Bhunia
    Journal of Electronic Testing, 2011, 27 : 767 - 785
  • [33] Formal Analysis of Reentrancy Vulnerabilities in Smart Contract Based on CPN
    He, Yaqiong
    Dong, Hanjie
    Wu, Huaiguang
    Duan, Qianheng
    ELECTRONICS, 2023, 12 (10)
  • [34] Formal Analysis of Vulnerabilities of Web Applications Based on SQL Injection
    De Meo, Federico
    Rocchetto, Marco
    Vigano, Luca
    SECURITY AND TRUST MANAGEMENT, STM 2016, 2016, 9871 : 179 - 195
  • [35] A software security assessment system based on analysis of vulnerabilities
    Sui, Chenmeng
    Liu, Yanzhao
    Liu, Yun
    Journal of Convergence Information Technology, 2012, 7 (06) : 211 - 219
  • [36] Analysis of the Security Vulnerabilities of 2.5-D and 3-D Integrated Circuits
    Rao, Vaibhav Venugopal
    Sasan, Avesta
    Savidis, Ioannis
    PROCEEDINGS OF THE TWENTY THIRD INTERNATIONAL SYMPOSIUM ON QUALITY ELECTRONIC DESIGN (ISQED 2022), 2022, : 387 - 393
  • [37] Side Channel Analysis of Hardware Trojan Based on Smooth Filtering Algorithm
    Zhang, Zixuan
    Li, Lei
    Tang, Tang
    Wei, Zhengyou
    2015 8TH INTERNATIONAL SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND DESIGN (ISCID), VOL 1, 2015, : 192 - 195
  • [38] Analysis of the Security Vulnerabilities of 2.5-D and 3-D Integrated Circuits
    Rao, Vaibhav Venugopal
    Sasan, Avesta
    Savidis, Ioannis
    Proceedings - International Symposium on Quality Electronic Design, ISQED, 2022, 2022-April
  • [39] An efficient methodology for hardware Trojan detection based on canonical correlation analysis
    Yu, Weize
    Wang, Yubing
    MICROELECTRONICS JOURNAL, 2021, 115
  • [40] An FPGA Hardware Trojan Detection Approach Based on Multiple Parameter Analysis
    Fournaris, Apostolos P.
    Pyrgas, Lampros
    Kitsos, Paris
    2018 21ST EUROMICRO CONFERENCE ON DIGITAL SYSTEM DESIGN (DSD 2018), 2018, : 516 - 522