Hardware Trojan Detection Based on Logical Testing

被引:23
|
作者
Bazzazi, Amin [1 ]
Shalmani, Mohammad Taghi Manzuri [2 ]
Hemmatyar, Ali Mohammad Afshin [2 ]
机构
[1] Sharif Univ Technol, Sch Sci & Engn, Int Campus, Kish Island, Iran
[2] Sharif Univ Technol, Comp Fac, Dept Comp Engn, Tehran, Iran
关键词
Hardware security; Hardware Trojans; Trojan localization; Detection methods; Runtime; Logic testing;
D O I
10.1007/s10836-017-5670-0
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In recent years, hardware Trojans (HTs) have become one of the main challenging concerns within the chain of manufacturing digital integrated circuit chips. Because of their diversity in chips, HTs are difficult to detect and locate. This paper attempted to propose a new improved method for detection and localization of HTs based on the real-time logical values of nodes. The algorithm extracts the nodes with special attributes. At the next stage, the nodes with the greatest similarity in terms of logical value are selected as targets. Depending on the size of the circuit, the extraction continues until a sufficient number of similar nodes has been selected. The logical relationship between the candidate nodes yields a function, the logical values of which differ in the Trojan-free and Trojan-infected modes, thus detecting the potential Trojans. This method is scalable, overcoming the problems of noise and Process variation. The success rate of Trojan detection in this method is more than 80%. The most overhead is 13% for power consumption and 15% for area.
引用
收藏
页码:381 / 395
页数:15
相关论文
共 50 条
  • [41] Hardware Trojan Detection Based on ELM Neural Network
    Wang, Sixiang
    Dong, Xiuze
    Sun, Kewang
    Cui, Qi
    Li, Dongxu
    He, Chunxiao
    2016 FIRST IEEE INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND THE INTERNET (ICCCI 2016), 2016, : 400 - 403
  • [42] A framework for hardware trojan detection based on contrastive learning
    Jiang, Zijing
    Ding, Qun
    SCIENTIFIC REPORTS, 2024, 14 (01):
  • [43] A comprehensive survey of physical and logic testing techniques for Hardware Trojan detection and prevention
    Mukherjee, Rijoy
    Rajendran, Sree Ranjani
    Chakraborty, Rajat Subhra
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2022, 12 (04) : 495 - 522
  • [44] Hardware Trojan Detection Using Exhaustive Testing of k-bit Subspaces
    Lesperance, Nicole
    Kulkarni, Shrikant
    Cheng, Kwang-Ting
    2015 20TH ASIA AND SOUTH PACIFIC DESIGN AUTOMATION CONFERENCE (ASP-DAC), 2015, : 755 - 760
  • [45] A comprehensive survey of physical and logic testing techniques for Hardware Trojan detection and prevention
    Rijoy Mukherjee
    Sree Ranjani Rajendran
    Rajat Subhra Chakraborty
    Journal of Cryptographic Engineering, 2022, 12 : 495 - 522
  • [46] A Novel Hardware Trojan Detection Based on BP Neural Network
    Li, Jun
    Chen, Jihua
    Ni, Lin
    Zhou, Errui
    2016 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS (ICCC), 2016, : 2790 - 2794
  • [47] Hardware Trojan Detection and Classification based on Steady State Learning
    Oya, Masaru
    Yanagisawa, Masao
    Togawa, Nozomu
    2017 IEEE 23RD INTERNATIONAL SYMPOSIUM ON ON-LINE TESTING AND ROBUST SYSTEM DESIGN (IOLTS), 2017, : 215 - 220
  • [48] Hardware Trojan detection based on self-differential analysis
    Zhang Y.
    Quan H.
    Li X.
    Chen K.
    Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition), 2019, 47 (02): : 98 - 102
  • [49] Hardware Trojan Detection Based on Ordered Mixed Feature GEP
    Zhang, Huan
    Zhou, Jiliu
    Gao, Dongrui
    Wang, Xinguo
    Chen, Zhefan
    Wang, Hongyu
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [50] Hardware Trojan Detection Technique Based on SOM Neural Network
    Wen, Ning
    Wang, Jian
    Zhang, Tao
    2018 EIGHTH INTERNATIONAL CONFERENCE ON INSTRUMENTATION AND MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC 2018), 2018, : 1645 - 1648