Affiliation:
1. Department of Electronics and Communication Engineering, Amrita School of Engineering, Amrita Vishwa Vidyapeetham, Coimbatore 641112, India
Abstract
The chances of detecting a malicious reliability attack induced by an offshore foundry are grim. The hardware Trojans affecting a circuit’s reliability do not tend to alter the circuit layout. These Trojans often manifest as an increased delay in certain parts of the circuit. These delay faults easily escape during the integrated circuits (IC) testing phase, hence are difficult to detect. If additional patterns to detect delay faults are generated during the test pattern generation stage, then reliability attacks can be detected early without any hardware overhead. This paper proposes a novel method to generate patterns that trigger Trojans without altering the circuit model. The generated patterns’ ability to diagnose clustered Trojans are also analyzed. The proposed method uses only single fault simulation to detect clustered Trojans, thereby reducing the computational complexity. Experimental results show that the proposed algorithm has a detection ratio of 99.99% when applied on ISCAS’89, ITC’99 and IWLS’05 benchmark circuits. Experiments on clustered Trojans indicate a 46% and 34% improvement in accuracy and resolution compared to a standard Automatic Test Pattern Generator (ATPG)Tool.
Subject
Applied Mathematics,Computational Theory and Mathematics,Computer Networks and Communications,Computer Science Applications,Software
Reference18 articles.
1. Bhasin, S., and Regazzoni, F. (2015, January 24–27). A survey on hardware trojan detection techniques. Proceedings of the 2015 IEEE International Symposium on Circuits and Systems (ISCAS), Lisbon, Portugal.
2. Hardware trojan attacks: Threat analysis and countermeasures;Bhunia;Proc. IEEE,2014
3. Hardware trojan detection using controlled circuit aging;Surabhi;IEEE Access,2020
4. TPAD: Hardware trojan prevention and detection for trusted integrated circuits;Wu;IEEE Trans. Comput. Des. Integr. Circuits Syst.,2016
5. Hardware trojan detection using deep learning technique;Reshma;Adv. Intell. Syst. Comput.,2019