Property Based Formal Security Verification for Hardware Trojan Detection

被引:0
|
作者
Qin, Maoyuan [1 ]
Hu, Wei [1 ]
Mu, Dejun [1 ]
Tai, Yu [1 ]
机构
[1] Northwestern Polytech Univ, Sch Automat, Xian 710072, Shaanxi, Peoples R China
关键词
Hardware security; information flow analysis; Coq; formal verification; hardware Trojan; INFORMATION-FLOW TRACKING; DATA SECRECY PROTECTION; FRAMEWORK;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The design of modern computer hardware heavily relies on third-party intellectual property (IP) cores, which may contain malicious hardware Trojans that could be exploited by an adversary to leak secret information or take control of the system. Existing hardware Trojan detection methods either require a golden reference design for comparison or extensive functional testing to identify suspicious signals. In this paper, we propose a new formal verification method to verify the security of hardware designs. The proposed solution formalizes fine grained gate level information flow model for proving security properties of hardware designs in the Coq theorem prover environment. Compare with existing register transfer level (RTL) information flow security models, our model only needs to translate a small number of logic primitives to their formal representations without the need of supporting the rich RTL HDL semantics or dealing with complex conditional branch or loop structures. As a result, a gate level information flow model can be created at much lower complexity while achieving significantly higher precision in modeling the security behavior of hardware designs. We use the AES-T1700 benchmark from Trust-HUB to demonstrate the effectiveness of our solution. Experimental results show that our method can detect and pinpoint the Trojan.
引用
收藏
页码:62 / 67
页数:6
相关论文
共 50 条
  • [31] A security method of hardware Trojan detection using path tracking algorithm
    Huang, Der-Chen
    Hsiao, Chun-Fang
    Chang, Tin-Wei
    Chu, Ying-Yi
    EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2022, 2022 (01)
  • [32] A security method of hardware Trojan detection using path tracking algorithm
    Der-Chen Huang
    Chun-Fang Hsiao
    Tin-Wei Chang
    Ying-Yi Chu
    EURASIP Journal on Wireless Communications and Networking, 2022
  • [33] XG Boost Algorithm based Hardware Trojan Detection in Hardware Circuits
    Vennila, A.
    Balambigai, S.
    Arulmurugan, A.
    Hema, M.
    Kamali, M.
    Kishore, M.
    2023 5th International Conference on Electrical, Computer and Communication Technologies, ICECCT 2023, 2023,
  • [34] On formal equivalence verification of hardware
    Khasidashvili, Zurab
    COMPUTER SCIENCE - THEORY AND APPLICATIONS, 2008, 5010 : 11 - 12
  • [35] Verification and Detection of a Wireless-Leakage Hardware Trojan Horse with Covert Channels
    Chen, Yancang
    Zhou, Ying
    Wei, Pei
    Sui, Sai
    Zhao, Yaxin
    Zhang, Minlei
    Xie, Lunguo
    PROCEEDINGS OF THE 2016 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, INFORMATION MANAGEMENT AND NETWORK SECURITY, 2016, 47 : 111 - 114
  • [36] LAOCOON: A Run-time Monitoring and Verification Approach for Hardware Trojan Detection
    Danger, Jean-Luc
    Fribourg, Laurent
    Naceur, Maha
    Kuhne, Ulrich
    2019 22ND EUROMICRO CONFERENCE ON DIGITAL SYSTEM DESIGN (DSD), 2019, : 269 - 276
  • [37] A Hardware Trojan Detection Method Based on Structural Features of Trojan and Host Circuits
    Liu, Qiang
    Zhao, Pengyong
    Chen, Fuqiang
    IEEE ACCESS, 2019, 7 : 44632 - 44644
  • [38] Formal Hardware/Software Co-Verification by Interval Property Checking with Abstraction
    Nguyen, Minh D.
    Wedler, Markus
    Stoffel, Dominik
    Kunz, Wolfgang
    PROCEEDINGS OF THE 48TH ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2011, : 510 - 515
  • [39] Hardware Trojan detection algorithm based on deep learning
    Liu Z.
    Zhang M.
    Chi Y.
    Li Y.
    Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2019, 46 (06): : 37 - 45
  • [40] Deep Learning Based Approach for Hardware Trojan Detection
    Amrita Vishwa Vidyapeetham, Center for Cybersecurity Systems and Networks, Amritapuri, India
    不详
    Proc. - IEEE Int. Symp. Smart Electron. Syst., iSES, 1600, (177-182): : 177 - 182