Hardware Trojan Detection Based on Logical Testing

被引:23
|
作者
Bazzazi, Amin [1 ]
Shalmani, Mohammad Taghi Manzuri [2 ]
Hemmatyar, Ali Mohammad Afshin [2 ]
机构
[1] Sharif Univ Technol, Sch Sci & Engn, Int Campus, Kish Island, Iran
[2] Sharif Univ Technol, Comp Fac, Dept Comp Engn, Tehran, Iran
关键词
Hardware security; Hardware Trojans; Trojan localization; Detection methods; Runtime; Logic testing;
D O I
10.1007/s10836-017-5670-0
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In recent years, hardware Trojans (HTs) have become one of the main challenging concerns within the chain of manufacturing digital integrated circuit chips. Because of their diversity in chips, HTs are difficult to detect and locate. This paper attempted to propose a new improved method for detection and localization of HTs based on the real-time logical values of nodes. The algorithm extracts the nodes with special attributes. At the next stage, the nodes with the greatest similarity in terms of logical value are selected as targets. Depending on the size of the circuit, the extraction continues until a sufficient number of similar nodes has been selected. The logical relationship between the candidate nodes yields a function, the logical values of which differ in the Trojan-free and Trojan-infected modes, thus detecting the potential Trojans. This method is scalable, overcoming the problems of noise and Process variation. The success rate of Trojan detection in this method is more than 80%. The most overhead is 13% for power consumption and 15% for area.
引用
收藏
页码:381 / 395
页数:15
相关论文
共 50 条
  • [21] Deep Learning Based Approach for Hardware Trojan Detection
    Amrita Vishwa Vidyapeetham, Center for Cybersecurity Systems and Networks, Amritapuri, India
    不详
    Proc. - IEEE Int. Symp. Smart Electron. Syst., iSES, 1600, (177-182): : 177 - 182
  • [22] Activity Factor Based Hardware Trojan Detection and Localization
    Yongkang Tang
    Liang Fang
    Shaoqing Li
    Journal of Electronic Testing, 2019, 35 : 293 - 302
  • [23] A Hardware Trojan Detection Method Based on the Electromagnetic Leakage
    Zhang, Lei
    Dong, Youheng
    Wang, Jianxin
    Xiao, Chaoen
    Ding, Ding
    CHINA COMMUNICATIONS, 2019, 16 (12) : 100 - 110
  • [24] On Reverse Engineering-Based Hardware Trojan Detection
    Department of Electrical and Computer Engineering, University of Maryland, College Park
    MD
    20742, United States
    不详
    FL
    32611, United States
    IEEE Trans Comput Aided Des Integr Circuits Syst, 1 (49-57):
  • [25] Power Analysis-based Hardware Trojan Detection
    Xue, Hao
    Li, Shuo
    Ren, Saiyu
    2017 IEEE NATIONAL AEROSPACE AND ELECTRONICS CONFERENCE (NAECON), 2017, : 253 - 257
  • [26] A Hardware Trojan Detection Method Based on the Electromagnetic Leakage
    Lei Zhang
    Youheng Dong
    Jianxin Wang
    Chaoen Xiao
    Ding Ding
    中国通信, 2019, 16 (12) : 100 - 110
  • [27] On Reverse Engineering-Based Hardware Trojan Detection
    Bao, Chongxi
    Forte, Domenic
    Srivastava, Ankur
    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2016, 35 (01) : 49 - 57
  • [28] Hardware Trojan Detection Based on Multiple Structural Features
    Yan Yingjian
    Zhao Conghui
    Liu Yanjiang
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2021, 43 (08) : 2128 - 2139
  • [29] Thermal Sensor Based Hardware Trojan Detection in FPGAs
    Pyrgas, Lampros
    Pirpilidis, Filippos
    Panayiotarou, Aliki
    Kitsos, Paris
    2017 EUROMICRO CONFERENCE ON DIGITAL SYSTEM DESIGN (DSD), 2017, : 268 - 273
  • [30] Deep Learning Based Approach for Hardware Trojan Detection
    Sankaran, Sriram
    Mohan, Vamshi Sunku
    Purushothaman, A.
    2021 IEEE INTERNATIONAL SYMPOSIUM ON SMART ELECTRONIC SYSTEMS (ISES 2021), 2021, : 177 - 182