ForASec: Formal Analysis of Hardware Trojan-Based Security Vulnerabilities in Sequential Circuits

被引:3
|
作者
Khalid, Faiq [1 ]
Abbassi, Imran Hafeez [2 ]
Rehman, Semeen [1 ]
Kamboh, Awais Mehmood [4 ]
Hasan, Osman [3 ,4 ]
Shafique, Muhammad [5 ]
机构
[1] Tech Univ Wien, Inst Comp Engn, A-1040 Vienna, Austria
[2] Natl Univ Sci & Technol, Coll Aeronaut Engn, Islamabad 44000, Pakistan
[3] Univ Jeddah, Coll Comp Sci & Engn, Dept Comp & Network Engn, Jeddah 21589, Saudi Arabia
[4] Natl Univ Sci & Technol, Sch Elect Engn & Comp Sci, Islamabad 44000, Pakistan
[5] New York Univ Abu Dhabi, Div Engn, Abu Dhabi, U Arab Emirates
关键词
Formal verification; gate-level modeling; hardware trojans (HTs); model checking; security vulnerabilities;
D O I
10.1109/TCAD.2021.3061524
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this article, we propose a novel model checking-based methodology that analyzes the hardware trojan (HT)-based security vulnerabilities in sequential circuits with 100% coverage while addressing the state-space explosion issue and completeness issue. In this work, the state-space explosion issue is addressed by efficiently partitioning the larger state space into corresponding smaller state spaces to enable the distributed HT-based security analysis of complex sequential circuits. We analyze multiple ISCAS89 and trust-hub benchmarks for different ASIC technologies, i.e., 65, 45, and 22 nm, to demonstrate the efficacy of our framework in identifying HT-based security vulnerabilities. The experimental results show that ForASec successfully performs the complete analysis of the given complex and large sequential circuits, and provides approximately 6 x-10 x speedup in analysis time compared to the state-of-the-art model checking-based techniques.
引用
收藏
页码:1167 / 1180
页数:14
相关论文
共 50 条
  • [41] Side channel analysis-based modeling and optimizing of hardware Trojan
    Liu, Changlong
    Zhao, Yiqiang
    Shi, Yafeng
    Feng, Zizhu
    Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition), 2013, 41 (02): : 53 - 57
  • [42] A Hardware Trojan Detection Method Based on Compression Marginal Fisher Analysis
    Wang Xiaohan
    Wang Tao
    Li Xiongwei
    Zhang Yang
    Huang Changyang
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2019, 41 (12) : 3043 - 3050
  • [43] A Hardware Trojan Detection Method Based on Side-channel Analysis
    Wang Xiaohan
    Li Xiongwei
    Xu Lu
    PROCEEDINGS OF THE 2015 2ND INTERNATIONAL CONFERENCE ON ELECTRICAL, COMPUTER ENGINEERING AND ELECTRONICS (ICECEE 2015), 2015, 24 : 1042 - 1047
  • [44] Graph-based approach towards hardware Trojan vulnerability analysis
    Islam, S. A.
    ELECTRONICS LETTERS, 2020, 56 (17) : 868 - 870
  • [45] Formal integrated network security analysis tool: formal query-based network security configuration analysis
    Maity, Soumya
    Bera, P.
    Ghosh, Soumya K.
    Al-Shaer, Ehab
    IET NETWORKS, 2015, 4 (02) : 137 - 147
  • [46] Ontology Model-Based Static Analysis of Security Vulnerabilities
    Yu, Lian
    Wu, Shi-Zhong
    Guo, Tao
    Dong, Guo-Wei
    Wan, Cheng-Cheng
    Jing, Yin-Hang
    INFORMATION AND COMMUNICATIONS SECURITY, 2011, 7043 : 330 - +
  • [47] A novel approach to cyberspace security situation based on the vulnerabilities analysis
    Hu, Wei
    Li, Hanhua
    Shi, Hanjun
    WCICA 2006: SIXTH WORLD CONGRESS ON INTELLIGENT CONTROL AND AUTOMATION, VOLS 1-12, CONFERENCE PROCEEDINGS, 2006, : 4747 - +
  • [48] A Statistical Test Generation Based on Mutation Analysis for Improving the Hardware Trojan Detection
    Liu, Yanjiang
    Zhao, Yiqiang
    He, Jiaji
    Xin, Ruishan
    JOURNAL OF CIRCUITS SYSTEMS AND COMPUTERS, 2020, 29 (03)
  • [49] A Failure Physics Model for Hardware Trojan Detection Based on Frequency Spectrum Analysis
    He, Chunhua
    Hou, Bo
    Wang, Liwei
    En, Yunfei
    Xie, Shaofeng
    2015 IEEE INTERNATIONAL RELIABILITY PHYSICS SYMPOSIUM (IRPS), 2015,
  • [50] Stealthy Hardware Trojan Based Algebraic Fault Analysis of HIGHT Block Cipher
    Chen, Hao
    Wang, Tao
    Zhang, Fan
    Zhao, Xinjie
    He, Wei
    Xu, Lumin
    Ma, Yunfei
    SECURITY AND COMMUNICATION NETWORKS, 2017,