Topic
Trojan
About: Trojan is a research topic. Over the lifetime, 2028 publications have been published within this topic receiving 33209 citations.
Papers published on a yearly basis
Papers
More filters
••
20 Aug 2013TL;DR: In this article, the authors study hardware trojan horses insertion and detection in cryptographic IP blocks, based on the comparison between optical microscopic pictures of the silicon product and the original view from a GDSII layout database reader.
Abstract: Detecting hardware trojans is a difficult task in general. In this article we study hardware trojan horses insertion and detection in cryptographic intellectual property (IP) blocks. The context is that of a fabless design house that sells IP blocks as GDSII hard macros, and wants to check that final products have not been infected by trojans during the foundry stage. First, we show the efficiency of a medium cost hardware trojans detection method if the placement or the routing have been redone by the foundry. It consists in the comparison between optical microscopic pictures of the silicon product and the original view from a GDSII layout database reader. Second, we analyze the ability of an attacker to introduce a hardware trojan horse without changing neither the placement nor the routing of the cryptographic IP logic. On the example of an AES engine, we show that if the placement density is beyond 80%, the insertion is basically impossible. Therefore, this settles a simple design guidance to avoid trojan horses insertion in cryptographic IP blocks: have the design be compact enough, so that any functionally discreet trojan necessarily requires a complete replace and re-route, which is detected by mere optical imaging (and not complete chip reverse-engineering).
109 citations
••
04 Jul 2016TL;DR: A SVM-based hardware-Trojan classification method that can much increase the true positive rate compared to the existing state-of-the-art results in most of the cases and successfully classify a set of all the nets in an unknown netlist into Trojan ones and normal ones based on the learned SVM classifier.
Abstract: Recently, we face a serious risk that malicious third-party vendors can very easily insert hardware Trojans into their IC products but it is very difficult to analyze huge and complex ICs. In this paper, we propose a hardware-Trojan classification method to identify hardware-Trojan infected nets (or Trojan nets) using a support vector machine (SVM). Firstly, we extract the five hardware-Trojan features in each net in a netlist. Secondly, since we cannot effectively give the simple and fixed threshold values to them to detect hardware Trojans, we represent them to be a five-dimensional vector and learn them by using SVM. Finally, we can successfully classify a set of all the nets in an unknown netlist into Trojan ones and normal ones based on the learned SVM classifier. We have applied our SVM-based hardware-Trojan classification method to Trust-HUB benchmarks and the results demonstrate that our method can much increase the true positive rate compared to the existing state-of-the-art results in most of the cases. In some cases, our method can achieve the true positive rate of 100%, which shows that all the Trojan nets in a netlist are completely detected by our method.
106 citations
••
18 Nov 2013TL;DR: This paper proposes innovative low-overhead approaches for run-time Trojan detection which exploit the thermal sensors already available in many modern systems to detect deviations in power/thermal profiles caused by Trojan activation.
Abstract: The hardware Trojan threat has motivated development of Trojan detection schemes at all stages of the integrated circuit (IC) lifecycle. While the majority of existing schemes focus on ICs at test-time, there are many unique advantages offered by post-deployment/run-time Trojan detection. However, run-time approaches have been underutilized with prior work highlighting the challenges of implementing them with limited hardware resources. In this paper, we propose innovative low-overhead approaches for run-time Trojan detection which exploit the thermal sensors already available in many modern systems to detect deviations in power/thermal profiles caused by Trojan activation. Simulation results using state-of-the-art tools on publicly available Trojan benchmarks verify that our approaches can detect active Trojans quickly and with few false positives.
103 citations
••
02 Nov 2009TL;DR: A new Trojan detection method based on nonintrusive external IC quiescent current measurements based on a new metric called consistency is introduced, and a robust estimation method that estimates the gate properties while simultaneously detecting the Trojans is presented.
Abstract: A Trojan attack maliciously modifies, alters, or embeds unplanned components inside the exploited chips. Given the original chip specifications, and process and simulation models, the goal of Trojan detection is to identify the malicious components. This paper introduces a new Trojan detection method based on nonintrusive external IC quiescent current measurements. We define a new metric called consistency. Based on the consistency metric and properties of the objective function, we present a robust estimation method that estimates the gate properties while simultaneously detecting the Trojans. Experimental evaluations on standard benchmark designs show the validity of the metric, and demonstrate the effectiveness of the new Trojan detection.
102 citations
••
TL;DR: In this article, the problem of stability of the Lagrangian equilibrium point of the circular restricted problem of three bodies is investigated in the light of Nekhoroshev-like theory.
Abstract: The problem of stability of the Lagrangian equilibrium point of the circular restricted problem of three bodies is investigated in the light of Nekhoroshev-like theory. Looking for stability over a time interval of the order of the estimated age of the universe, we find a physically relevant stability region. An application of the method to the Sun-Jupiter and the Earth-Moon systems is made. Moreover, we try to compare the size of our stability region with that of the region where the Trojan asteroids are actually found; the result in such case is negative, thus leaving open the problem of the stability of these asteroids.
100 citations