Journal ArticleDOI
COTD: Reference-Free Hardware Trojan Detection and Recovery Based on Controllability and Observability in Gate-Level Netlist
TLDR
Using an unsupervised clustering analysis, the paper shows that the controllability and observability characteristics of Trojan gates present significant inter-cluster distance from those of genuine gates in a Trojan-inserted circuit, such that Trojan gates are easily distinguishable.Abstract:
This paper presents a novel hardware Trojan detection technique in gate-level netlist based on the controllability and observability analyses. Using an unsupervised clustering analysis, the paper shows that the controllability and observability characteristics of Trojan gates present significant inter-cluster distance from those of genuine gates in a Trojan-inserted circuit, such that Trojan gates are easily distinguishable. The proposed technique does not require any golden model and can be easily integrated into the current integrated circuit design flow. Furthermore, it performs a static analysis and does not require any test pattern application for Trojan activation either partially or fully. In addition, the timing complexity of the proposed technique is an order of the number of signals in a circuit. Moreover, the proposed technique makes it possible to fully restore an inserted Trojan and to isolate its trigger and payload circuits. The technique has been applied on various types of Trojans, and all Trojans are successfully detected with 0 false positive and negative rates in less than 14 s in the worst case.read more
Citations
More filters
Overcoming an untrusted computing base: detecting and removing malicious hardware automatically
TL;DR: This paper proposes BlueChip, a defensive strategy that has both a design-time component and a runtime component that is able to prevent all hardware attacks the authors evaluate while incurring a small runtime overhead.
Journal ArticleDOI
A Survey on Machine Learning Against Hardware Trojan Attacks: Recent Advances and Challenges
TL;DR: In this article, the authors provide a classification of all possible HT attacks and then review recent developments from four perspectives, i.e., HT detection, design-for-security (DFS), bus security, and secure architecture.
Proceedings ArticleDOI
An automated configurable Trojan insertion framework for dynamic trust benchmarks
TL;DR: Experiments demonstrate that a state-of-the-art Trojan detection technique provides poor efficacy when using benchmarks generated by the developed comprehensive framework of automatic hardware Trojan insertion.
Journal ArticleDOI
Machine Learning for Hardware Security: Opportunities and Risks
TL;DR: This work explores the defense and attack mechanisms for hardware that are based on machine learning and identifies suitable machine learning algorithms for each category of hardware security problems.
Proceedings ArticleDOI
Automated Test Generation for Hardware Trojan Detection using Reinforcement Learning
Zhixin Pan,Prabhat Mishra +1 more
TL;DR: In this paper, the authors proposed a logic testing approach for Trojan detection using an effective combination of testability analysis and reinforcement learning, which can significantly improve the trigger coverage and reduce the test generation time.
References
More filters
Journal Article
[''R"--project for statistical computing].
TL;DR: An introduction to the R project for statistical computing (www.R-project.org) is presented to make the professional community aware of "R" as a potent and free software for graphical and statistical analysis of medical data.
Proceedings ArticleDOI
Trojan Detection using IC Fingerprinting
TL;DR: These results show that Trojans that are 3-4 orders of magnitude smaller than the main circuit can be detected by signal processing techniques and provide a starting point to address this important problem.
Journal ArticleDOI
Trustworthy Hardware: Identifying and Classifying Hardware Trojans
TL;DR: A proposed new hardware Trojan taxonomy provides a first step in better understanding existing and potential threats.
Book ChapterDOI
MERO: A Statistical Approach for Hardware Trojan Detection
TL;DR: A test pattern generation technique based on multiple excitation of rare logic conditions at internal nodes that maximizes the probability of inserted Trojans getting triggered and detected by logic testing, while drastically reducing the number of vectors compared to a weighted random pattern based test generation.
BookDOI
Introduction to Hardware Security and Trust
Mohammad Tehranipoor,Cliff Wang +1 more
TL;DR: This book provides the foundations for understanding hardware security and trust issues in all types of electronic devices and systems such as ASICs, COTS, FPGAs, microprocessors/DSPs, and embedded systems.