scispace - formally typeset
Journal ArticleDOI

COTD: Reference-Free Hardware Trojan Detection and Recovery Based on Controllability and Observability in Gate-Level Netlist

Hassan Salmani
- 01 Feb 2017 - 
- Vol. 12, Iss: 2, pp 338-350
TLDR
Using an unsupervised clustering analysis, the paper shows that the controllability and observability characteristics of Trojan gates present significant inter-cluster distance from those of genuine gates in a Trojan-inserted circuit, such that Trojan gates are easily distinguishable.
Abstract
This paper presents a novel hardware Trojan detection technique in gate-level netlist based on the controllability and observability analyses. Using an unsupervised clustering analysis, the paper shows that the controllability and observability characteristics of Trojan gates present significant inter-cluster distance from those of genuine gates in a Trojan-inserted circuit, such that Trojan gates are easily distinguishable. The proposed technique does not require any golden model and can be easily integrated into the current integrated circuit design flow. Furthermore, it performs a static analysis and does not require any test pattern application for Trojan activation either partially or fully. In addition, the timing complexity of the proposed technique is an order of the number of signals in a circuit. Moreover, the proposed technique makes it possible to fully restore an inserted Trojan and to isolate its trigger and payload circuits. The technique has been applied on various types of Trojans, and all Trojans are successfully detected with 0 false positive and negative rates in less than 14 s in the worst case.

read more

Citations
More filters

Overcoming an untrusted computing base: detecting and removing malicious hardware automatically

TL;DR: This paper proposes BlueChip, a defensive strategy that has both a design-time component and a runtime component that is able to prevent all hardware attacks the authors evaluate while incurring a small runtime overhead.
Journal ArticleDOI

A Survey on Machine Learning Against Hardware Trojan Attacks: Recent Advances and Challenges

TL;DR: In this article, the authors provide a classification of all possible HT attacks and then review recent developments from four perspectives, i.e., HT detection, design-for-security (DFS), bus security, and secure architecture.
Proceedings ArticleDOI

An automated configurable Trojan insertion framework for dynamic trust benchmarks

TL;DR: Experiments demonstrate that a state-of-the-art Trojan detection technique provides poor efficacy when using benchmarks generated by the developed comprehensive framework of automatic hardware Trojan insertion.
Journal ArticleDOI

Machine Learning for Hardware Security: Opportunities and Risks

TL;DR: This work explores the defense and attack mechanisms for hardware that are based on machine learning and identifies suitable machine learning algorithms for each category of hardware security problems.
Proceedings ArticleDOI

Automated Test Generation for Hardware Trojan Detection using Reinforcement Learning

TL;DR: In this paper, the authors proposed a logic testing approach for Trojan detection using an effective combination of testability analysis and reinforcement learning, which can significantly improve the trigger coverage and reduce the test generation time.
References
More filters
Journal Article

[''R"--project for statistical computing].

TL;DR: An introduction to the R project for statistical computing (www.R-project.org) is presented to make the professional community aware of "R" as a potent and free software for graphical and statistical analysis of medical data.
Proceedings ArticleDOI

Trojan Detection using IC Fingerprinting

TL;DR: These results show that Trojans that are 3-4 orders of magnitude smaller than the main circuit can be detected by signal processing techniques and provide a starting point to address this important problem.
Journal ArticleDOI

Trustworthy Hardware: Identifying and Classifying Hardware Trojans

TL;DR: A proposed new hardware Trojan taxonomy provides a first step in better understanding existing and potential threats.
Book ChapterDOI

MERO: A Statistical Approach for Hardware Trojan Detection

TL;DR: A test pattern generation technique based on multiple excitation of rare logic conditions at internal nodes that maximizes the probability of inserted Trojans getting triggered and detected by logic testing, while drastically reducing the number of vectors compared to a weighted random pattern based test generation.
BookDOI

Introduction to Hardware Security and Trust

TL;DR: This book provides the foundations for understanding hardware security and trust issues in all types of electronic devices and systems such as ASICs, COTS, FPGAs, microprocessors/DSPs, and embedded systems.
Related Papers (5)