Property Based Formal Security Verification for Hardware Trojan Detection

被引:0
|
作者
Qin, Maoyuan [1 ]
Hu, Wei [1 ]
Mu, Dejun [1 ]
Tai, Yu [1 ]
机构
[1] Northwestern Polytech Univ, Sch Automat, Xian 710072, Shaanxi, Peoples R China
关键词
Hardware security; information flow analysis; Coq; formal verification; hardware Trojan; INFORMATION-FLOW TRACKING; DATA SECRECY PROTECTION; FRAMEWORK;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The design of modern computer hardware heavily relies on third-party intellectual property (IP) cores, which may contain malicious hardware Trojans that could be exploited by an adversary to leak secret information or take control of the system. Existing hardware Trojan detection methods either require a golden reference design for comparison or extensive functional testing to identify suspicious signals. In this paper, we propose a new formal verification method to verify the security of hardware designs. The proposed solution formalizes fine grained gate level information flow model for proving security properties of hardware designs in the Coq theorem prover environment. Compare with existing register transfer level (RTL) information flow security models, our model only needs to translate a small number of logic primitives to their formal representations without the need of supporting the rich RTL HDL semantics or dealing with complex conditional branch or loop structures. As a result, a gate level information flow model can be created at much lower complexity while achieving significantly higher precision in modeling the security behavior of hardware designs. We use the AES-T1700 benchmark from Trust-HUB to demonstrate the effectiveness of our solution. Experimental results show that our method can detect and pinpoint the Trojan.
引用
收藏
页码:62 / 67
页数:6
相关论文
共 50 条
  • [41] Activity Factor Based Hardware Trojan Detection and Localization
    Yongkang Tang
    Liang Fang
    Shaoqing Li
    Journal of Electronic Testing, 2019, 35 : 293 - 302
  • [42] A Hardware Trojan Detection Method Based on the Electromagnetic Leakage
    Zhang, Lei
    Dong, Youheng
    Wang, Jianxin
    Xiao, Chaoen
    Ding, Ding
    CHINA COMMUNICATIONS, 2019, 16 (12) : 100 - 110
  • [43] On Reverse Engineering-Based Hardware Trojan Detection
    Department of Electrical and Computer Engineering, University of Maryland, College Park
    MD
    20742, United States
    不详
    FL
    32611, United States
    IEEE Trans Comput Aided Des Integr Circuits Syst, 1 (49-57):
  • [44] Power Analysis-based Hardware Trojan Detection
    Xue, Hao
    Li, Shuo
    Ren, Saiyu
    2017 IEEE NATIONAL AEROSPACE AND ELECTRONICS CONFERENCE (NAECON), 2017, : 253 - 257
  • [45] A Hardware Trojan Detection Method Based on the Electromagnetic Leakage
    Lei Zhang
    Youheng Dong
    Jianxin Wang
    Chaoen Xiao
    Ding Ding
    中国通信, 2019, 16 (12) : 100 - 110
  • [46] On Reverse Engineering-Based Hardware Trojan Detection
    Bao, Chongxi
    Forte, Domenic
    Srivastava, Ankur
    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2016, 35 (01) : 49 - 57
  • [47] Hardware Trojan Detection Based on Multiple Structural Features
    Yan Yingjian
    Zhao Conghui
    Liu Yanjiang
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2021, 43 (08) : 2128 - 2139
  • [48] Thermal Sensor Based Hardware Trojan Detection in FPGAs
    Pyrgas, Lampros
    Pirpilidis, Filippos
    Panayiotarou, Aliki
    Kitsos, Paris
    2017 EUROMICRO CONFERENCE ON DIGITAL SYSTEM DESIGN (DSD), 2017, : 268 - 273
  • [49] Deep Learning Based Approach for Hardware Trojan Detection
    Sankaran, Sriram
    Mohan, Vamshi Sunku
    Purushothaman, A.
    2021 IEEE INTERNATIONAL SYMPOSIUM ON SMART ELECTRONIC SYSTEMS (ISES 2021), 2021, : 177 - 182
  • [50] Self-Reference-Based Hardware Trojan Detection
    Xue, Hao
    Ren, Saiyu
    IEEE TRANSACTIONS ON SEMICONDUCTOR MANUFACTURING, 2018, 31 (01) : 2 - 11