Property Based Formal Security Verification for Hardware Trojan Detection

被引:0
|
作者
Qin, Maoyuan [1 ]
Hu, Wei [1 ]
Mu, Dejun [1 ]
Tai, Yu [1 ]
机构
[1] Northwestern Polytech Univ, Sch Automat, Xian 710072, Shaanxi, Peoples R China
关键词
Hardware security; information flow analysis; Coq; formal verification; hardware Trojan; INFORMATION-FLOW TRACKING; DATA SECRECY PROTECTION; FRAMEWORK;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The design of modern computer hardware heavily relies on third-party intellectual property (IP) cores, which may contain malicious hardware Trojans that could be exploited by an adversary to leak secret information or take control of the system. Existing hardware Trojan detection methods either require a golden reference design for comparison or extensive functional testing to identify suspicious signals. In this paper, we propose a new formal verification method to verify the security of hardware designs. The proposed solution formalizes fine grained gate level information flow model for proving security properties of hardware designs in the Coq theorem prover environment. Compare with existing register transfer level (RTL) information flow security models, our model only needs to translate a small number of logic primitives to their formal representations without the need of supporting the rich RTL HDL semantics or dealing with complex conditional branch or loop structures. As a result, a gate level information flow model can be created at much lower complexity while achieving significantly higher precision in modeling the security behavior of hardware designs. We use the AES-T1700 benchmark from Trust-HUB to demonstrate the effectiveness of our solution. Experimental results show that our method can detect and pinpoint the Trojan.
引用
收藏
页码:62 / 67
页数:6
相关论文
共 50 条
  • [21] Hardware trojan detection
    Case Western Reserve University, Cleveland, United States
    Introduction to Hardw. Secty. and Trust, (339-364):
  • [22] Hardware Trojan Detection Based on Image Comparison
    Sun, Chen
    Guo, Xiaohui
    Li, Lingling
    Ma, Jingjing
    Lecture Notes on Data Engineering and Communications Technologies, 2022, 80 : 979 - 986
  • [23] Hardware Trojan Detection Based on Logical Testing
    Bazzazi, Amin
    Shalmani, Mohammad Taghi Manzuri
    Hemmatyar, Ali Mohammad Afshin
    JOURNAL OF ELECTRONIC TESTING-THEORY AND APPLICATIONS, 2017, 33 (04): : 381 - 395
  • [24] Hardware Trojan Detection Based on the Distance Discrimination
    Wang Jianxin
    Wang Boren
    Qu Ming
    Zhang Lei
    Xiao Chaoen
    2016 FIRST IEEE INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND THE INTERNET (ICCCI 2016), 2016, : 404 - 407
  • [25] Hardware Trojan Detection Based on Signal Correlation
    Zhao, Wei
    Shen, Haihua
    Li, Huawei
    Li, Xiaowei
    2018 IEEE 27TH ASIAN TEST SYMPOSIUM (ATS), 2018, : 80 - 85
  • [26] Hardware Trojan Detection Based on Logical Testing
    Amin Bazzazi
    Mohammad Taghi Manzuri Shalmani
    Ali Mohammad Afshin Hemmatyar
    Journal of Electronic Testing, 2017, 33 : 381 - 395
  • [27] Property Specific Information Flow Analysis for Hardware Security Verification
    Hu, Wei
    Ardeshiricham, Armaiti
    Gobulukoglu, Mustafa S.
    Wang, Xinmu
    Kastner, Ryan
    2018 IEEE/ACM INTERNATIONAL CONFERENCE ON COMPUTER-AIDED DESIGN (ICCAD) DIGEST OF TECHNICAL PAPERS, 2018,
  • [28] Runtime hardware Trojan monitors through modeling burst mode communication using formal verification
    Khalid, Faiq
    Hasan, Syed Rafay
    Hasan, Osman
    Awwad, Falah
    INTEGRATION-THE VLSI JOURNAL, 2018, 61 : 62 - 76
  • [29] Hardware Trojan Detection Using Effective Property-Checking Method
    Li, Dejian
    Zhang, Qizhi
    Zhao, Dongyan
    Li, Lei
    He, Jiaji
    Yuan, Yidong
    Zhao, Yiqiang
    ELECTRONICS, 2022, 11 (17)
  • [30] Formal Analysis of Macro Synchronous Micro Asychronous Pipeline for Hardware Trojan Detection
    Lodhi, F. K.
    Hasan, S. R.
    Hasan, O.
    Awwad, F.
    2015 NORDIC CIRCUITS AND SYSTEMS CONFERENCE (NORCAS) - NORCHIP & INTERNATIONAL SYMPOSIUM ON SYSTEM-ON-CHIP (SOC), 2015,