Property Based Formal Security Verification for Hardware Trojan Detection

被引:0
|
作者
Qin, Maoyuan [1 ]
Hu, Wei [1 ]
Mu, Dejun [1 ]
Tai, Yu [1 ]
机构
[1] Northwestern Polytech Univ, Sch Automat, Xian 710072, Shaanxi, Peoples R China
关键词
Hardware security; information flow analysis; Coq; formal verification; hardware Trojan; INFORMATION-FLOW TRACKING; DATA SECRECY PROTECTION; FRAMEWORK;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The design of modern computer hardware heavily relies on third-party intellectual property (IP) cores, which may contain malicious hardware Trojans that could be exploited by an adversary to leak secret information or take control of the system. Existing hardware Trojan detection methods either require a golden reference design for comparison or extensive functional testing to identify suspicious signals. In this paper, we propose a new formal verification method to verify the security of hardware designs. The proposed solution formalizes fine grained gate level information flow model for proving security properties of hardware designs in the Coq theorem prover environment. Compare with existing register transfer level (RTL) information flow security models, our model only needs to translate a small number of logic primitives to their formal representations without the need of supporting the rich RTL HDL semantics or dealing with complex conditional branch or loop structures. As a result, a gate level information flow model can be created at much lower complexity while achieving significantly higher precision in modeling the security behavior of hardware designs. We use the AES-T1700 benchmark from Trust-HUB to demonstrate the effectiveness of our solution. Experimental results show that our method can detect and pinpoint the Trojan.
引用
收藏
页码:62 / 67
页数:6
相关论文
共 50 条
  • [1] Formal Verification for Hardware Trojan Detection
    Ponugoti, Kushal Kumar
    ProQuest Dissertations and Theses Global, 2023,
  • [2] Formal Verification for Hardware Trojan Detection
    Ponugoti, Kushal Kumar
    ProQuest Dissertations and Theses Global, 2023,
  • [3] Hardware Security Analysis of Arbiters: Trojan Modeling and Formal Verification
    Ibrahim, Hala
    Azmi, Haytham
    El-Kharashi, M. Watheq
    Safar, Mona
    2023 IFIP/IEEE 31ST INTERNATIONAL CONFERENCE ON VERY LARGE SCALE INTEGRATION, VLSI-SOC, 2023, : 86 - 91
  • [4] HT-PGFV: Security-Aware Hardware Trojan Security Property Generation and Formal Security Verification Scheme
    Qin, Maoyuan
    Li, Jiale
    Yan, Jiaqi
    Hao, Zishuai
    Hu, Wei
    Liu, Baolong
    ELECTRONICS, 2024, 13 (21)
  • [5] Reusing Verification Assertions as Security Checkers for Hardware Trojan Detection
    Eslami, Mohammad
    Ghasempouri, Tara
    Pagliarini, Samuel
    arXiv, 2022,
  • [6] Hardware Trojan Detection through Information Flow Security Verification
    Nahiyan, Adib
    Sadi, Mehdi
    Vittal, Rahul
    Contreras, Gustavo
    Forte, Domenic
    Tehranipoor, Mark
    2017 IEEE INTERNATIONAL TEST CONFERENCE (ITC), 2017,
  • [7] Reusing Verification Assertions as Security Checkers for Hardware Trojan Detection
    Eslami, Mohammad
    Ghasempouri, Tara
    Pagliarini, Samuel
    PROCEEDINGS OF THE TWENTY THIRD INTERNATIONAL SYMPOSIUM ON QUALITY ELECTRONIC DESIGN (ISQED 2022), 2022, : 236 - 241
  • [8] CRC-Based Hardware Trojan Detection for Improved Hardware Security
    Mohankumar, N.
    Jayakumar, M.
    Nirmala Devi, M.
    Lecture Notes in Electrical Engineering, 2018, 471 : 381 - 389
  • [9] Applied Formal Methods for Hardware Trojan Detection
    Rathmair, Michael
    Schupfer, Florian
    Krieg, Christian
    2014 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2014, : 169 - 172
  • [10] ForASec: Formal Analysis of Hardware Trojan-Based Security Vulnerabilities in Sequential Circuits
    Khalid, Faiq
    Abbassi, Imran Hafeez
    Rehman, Semeen
    Kamboh, Awais Mehmood
    Hasan, Osman
    Shafique, Muhammad
    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2022, 41 (04) : 1167 - 1180