Affiliation:
1. School of Microelectronics, Tianjin University, Tianjin Shi, China
2. Institute of Microelectronics, Tsinghua University, Beijing Shi, China
Abstract
Hardware Trojan (HT) is a major threat to the security of integrated circuits (ICs). Among various HT detection approaches, side channel analysis (SCA)-based methods have been extensively studied. SCA-based methods try to detect HTs by comparing side channel signatures from circuits under test with those from trusted golden references. The pre-condition for SCA-based HT detection to work is that the testers can collect extra signatures/anomalies introduced by activated HTs. Thus, activation of HTs and amplification of the differences between circuits under test and golden references are the keys to SCA-based HT detection methods. Test vectors are of great importance to the activation of HTs, but existing test generation methods have two major limitations. First, the number of test vectors required to trigger HTs is quite large. Second, the HT circuit’s activities are marginal compared with the whole circuit’s activities. In this article, we propose an optimized test generation methodology to assist SCA-based HT detection. Considering the HTs’ inherent surreptitious nature, inactive nodes with low transition probability are more likely to be selected as HT trigger nodes. Therefore, the correlations between circuit inputs and inactive nodes are first exploited to activate HTs. Then a test reordering process based on the genetic algorithm (GA) is implemented to increase the proportion of the HT circuit’s activities to the whole circuit’s activities. Experiments on 10 selected ISCAS benchmarks, wb_conmax benchmark, and b17 benchmark demonstrate that the number of test vectors required to trigger HTs reduces 28.8% on average compared with the result of MERO and MERS methods. After the test vector reordering process, the proportion of the HT circuit’s activities to the whole circuit’s activities is improved by 95% on average, compared with the result of MERS method.
Funder
China Postdoctoral Science Foundation
National Natural Science Foundation of China
Publisher
Association for Computing Machinery (ACM)
Subject
Hardware and Architecture,Software
Reference43 articles.
1. Evaluation of the quality of N-detect scan ATPG patterns on a processor
2. Temperature Tracking: Toward Robust Run-Time Detection of Hardware Trojans
3. ISCAS benchmark circuits. 2007. Retrieved from http://www.pld.ttu.ee/ maksim/benchmarks/. ISCAS benchmark circuits. 2007. Retrieved from http://www.pld.ttu.ee/ maksim/benchmarks/.
4. Trust-Hub benchmark circuits. 2013. Retrieved from https://www.trust-hub.org/benchmarks/chip-level-trojan. Trust-Hub benchmark circuits. 2013. Retrieved from https://www.trust-hub.org/benchmarks/chip-level-trojan.
Cited by
10 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献