Affiliation:
1. University of Florida, Gainesville, FL, USA
Abstract
Detection of hardware Trojans is vital to ensure the security and trustworthiness of System-on-Chip (SoC) designs. Side-channel analysis is effective for Trojan detection by analyzing various side-channel signatures such as power, current, and delay. In this article, we propose an efficient test generation technique to facilitate side-channel analysis utilizing dynamic current. While early work on current-aware test generation has proposed several promising ideas, there are two major challenges in applying it on large designs: (i) The test generation time grows exponentially with the design complexity, and (ii) it is infeasible to detect Trojans, since the side-channel sensitivity is marginal compared to the noise and process variations. Our proposed work addresses both challenges by effectively exploiting the affinity between the inputs and rare (suspicious) nodes. The basic idea is to quickly find the profitable ordered pairs of test vectors that can maximize side-channel sensitivity. This article makes two important contributions: (i) It proposed an efficient test generation algorithm that can produce the first patterns in the test vectors to maximize activation of suspicious nodes using an SMT solver, and (ii) it developed a genetic-algorithm based test generation technique to produce the second patterns in the test vectors to maximize the switching in the suspicious regions while minimizing the switching in the rest of the design. Our experimental results demonstrate that we can drastically improve both the side-channel sensitivity (62× on average) and time complexity (13× on average) compared to the state-of-the-art test generation techniques.
Funder
National Science Foundation
Publisher
Association for Computing Machinery (ACM)
Subject
Electrical and Electronic Engineering,Computer Graphics and Computer-Aided Design,Computer Science Applications
Reference53 articles.
1. [n.d.]. ISCAS89 Sequential Benchmark Circuits. Retrieved from https://filebox.ece.vt.edu/~mhsiao/iscas89.html. [n.d.]. ISCAS89 Sequential Benchmark Circuits. Retrieved from https://filebox.ece.vt.edu/~mhsiao/iscas89.html.
2. [n.d.]. OpenCores. Retrieved from https://www.opencores.org/. [n.d.]. OpenCores. Retrieved from https://www.opencores.org/.
3. [n.d.]. TrustHub. Retrieved from https://www.trust-hub.org/. [n.d.]. TrustHub. Retrieved from https://www.trust-hub.org/.
4. McSeVIC: A Model Checking Based Framework for Security Vulnerability Analysis of Integrated Circuits
Cited by
19 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Towards the Detection of Hardware Trojans with Cost Effective Test Vectors using Genetic Algorithm;Journal of Electronic Testing;2024-06
2. Feature extraction and classification algorithm of open source Trojan family variants based on graph network;2024 IEEE 4th International Conference on Electronic Technology, Communication and Information (ICETCI);2024-05-24
3. Exploring the PSO-Driven Test Pattern Generation Approach for Hardware Trojan Detection;2024 IEEE International Conference on Interdisciplinary Approaches in Technology and Management for Social Innovation (IATMSI);2024-03-14
4. Directed Test Generation for Hardware Validation: A Survey;ACM Computing Surveys;2024-01-12
5. DETERRENT: Detecting Trojans Using Reinforcement Learning;IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems;2024-01