Formal Verification Approach to Detect Always-On Denial of Service Trojans in Pipelined Circuits

被引:2
|
作者
Ponugoti, Kushal K. [1 ]
Srinivasan, Sudarshan K. [1 ]
Mathure, Nimish [1 ]
机构
[1] North Dakota State Univ, Dept Elect & Comp Engn, Fargo, ND 58105 USA
基金
美国国家科学基金会;
关键词
Formal Verification; Hardware Trojans; Denial of Service; Always-On;
D O I
10.1109/ICECS53924.2021.9665617
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Always-On Denial of Service (DoS) Trojans with power drain payload can be disastrous in systems where on-chip power resources are limited. These Trojans are designed so that they have no impact on system behavior and hence, harder to detect. A formal verification method is presented to detect sequential always-on DoS Trojans in pipelined circuits and pipelined microprocessors. Since the method is proof-based, it provides a 100% accurate classification of sequential Trojan components. Another benefit of the approach is that it does not require a reference model, which is one of the requirements of many Trojan detection techniques (often a bottleneck to practical application). The efficiency and scalability of the proposed method have been evaluated on 36 benchmark circuits. The most complex of these benchmarks has as many as 135,898 gates. Detection times are very efficient with a 100% rate of detection, i.e., all Trojan sequential elements were detected and all non-trojan sequential elements were classified as such.
引用
收藏
页数:6
相关论文
共 33 条
  • [21] Smart Scan: An Approach to Detect Denial of Service Vulnerability in Ethereum Smart Contracts
    Janjua, Husnain Ahmed
    Yue, Li
    Hayat, Shoaib
    PROCEEDINGS OF 2023 7TH INTERNATIONAL CONFERENCE ON ELECTRONIC INFORMATION TECHNOLOGY AND COMPUTER ENGINEERING, EITCE 2023, 2023, : 1572 - 1578
  • [22] Formal Verification for Web Service Composition: A Model-checking Approach
    Ghannoudi, Majdi
    Chainbi, Walid
    2015 International Symposium on Networks, Computers and Communications (ISNCC 2015), 2015,
  • [23] Trust based approach to detect and prevent distributed denial of service attacks and flash crowds in VoIP services
    Jeyanthi, N.
    Iyengar, N. Ch. S. N.
    International Journal of Security and its Applications, 2011, 5 (03): : 59 - 74
  • [24] Model-driven approach supporting formal verification for web service composition protocols
    Dumez, C.
    Bakhouya, M.
    Gaber, J.
    Wack, M.
    Lorenz, P.
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2013, 36 (04) : 1102 - 1115
  • [25] Integrating a Model-Driven Approach and Formal Verification for the Development of Secure Service Applications
    Borek, Marian
    Katkalov, Kuzman
    Moebius, Nina
    Reif, Wolfgang
    Schellhorn, Gerhard
    Stenzel, Kurt
    CORRECT SOFTWARE IN WEB APPLICATIONS AND WEB SERVICES, 2015, : 45 - 81
  • [26] Cloud manufacturing service composition in IoT applications: a formal verification-based approach
    Souri, Alireza
    Ghobaei-Arani, Mostafa
    MULTIMEDIA TOOLS AND APPLICATIONS, 2022, 81 (19) : 26759 - 26778
  • [27] Cloud manufacturing service composition in IoT applications: a formal verification-based approach
    Alireza Souri
    Mostafa Ghobaei-Arani
    Multimedia Tools and Applications, 2022, 81 : 26759 - 26778
  • [28] Formal modeling and verification of a service composition approach in the social customer relationship management system
    Souri, Alireza
    Rahmani, Amir Masoud
    Navimipour, Nima Jafari
    Rezaei, Reza
    INFORMATION TECHNOLOGY & PEOPLE, 2019, 32 (06) : 1591 - 1607
  • [29] Generic and Specific Compatibility Criteria for Web Service Composition: Formal Abstraction and Modular Verification Approach
    Klai, Kais
    Tata, Samir
    Ochi, Hanen
    INTERNATIONAL JOURNAL OF WEB SERVICES RESEARCH, 2012, 9 (04) : 45 - 68
  • [30] A hybrid formal verification approach for QoS-aware multi-cloud service composition
    Alireza Souri
    Amir Masoud Rahmani
    Nima Jafari Navimipour
    Reza Rezaei
    Cluster Computing, 2020, 23 : 2453 - 2470