Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2656075.2656077acmconferencesArticle/Chapter ViewAbstractPublication PagesesweekConference Proceedingsconference-collections
research-article

A low cost acceleration method for hardware trojan detection based on fan-out cone analysis

Published: 12 October 2014 Publication History
  • Get Citation Alerts
  • Abstract

    Fabless semiconductor industry and government agencies have raised serious concerns about tampering with inserting hardware Trojans in an integrated circuit supply chain in recent years. In this paper, a low hardware overhead acceleration method of the detection of HTs based on the insertion of 2-to-1 MUXs as test points is proposed. In the proposed method, the fact that one logical gate has a significant impact on the transition probability of the logical gates in its logical fan-out cone is utilized to optimize the number of the insertion MUXs. The nets which have smaller transition probability than the threshold value set by the user and minimal logical depth from the primary inputs are selected as the candidate nets. As for each candidate net, only its input net with smallest signal probability is required to be inserted the MUXs based test points until the minimal transition probability of the entire circuit is no smaller than the threshold value. Experiment results on ISCAS'89 benchmark circuits show that our proposed method can achieve remarkable improvement of transition probability with small overhead penalty.

    References

    [1]
    H. Salmani, M. Tehranipoor, J. Plusquellic. A Novel Technique for Improving Hardware Trojan Detection and Reducing Trojan Activation Time. IEEE Transactions on Very Large Scale Integration (VLSI) Systems. 2012, 20(1):112--125
    [2]
    M. Tehranipoor, F. Koushanfar. A Survey of Hardware Trojan Taxonomy and Detection. IEEE Design & Test of Computers. 2010, 27(1): 10--25
    [3]
    R. S. Chakraborty, S. Bhunia. Security against hardware Trojan through a novel application of design obfuscation. In Proceedings of International Conference on Computer-Aided Design(ICCAD). 2009:113--116
    [4]
    B. Cha, S. K. Gupta. Trojan detection via delay measurements: A new approach to select paths and vectors to maximize effectiveness and minimize cost. In Proceedings of Design, Automation & Test in Europe Conference & Exhibition (DATE). 2013:1265--1270
    [5]
    Y. Jin, Y. Makris. Hardware Trojan Detection Using Path Delay Fingerprint. In Proceedings of IEEE International Workshop on Hardware-Oriented Security and Trust(HOST). 2008:51--57
    [6]
    K. Xiao, X. Zhang, M. Tehranipoor. A Clock Sweeping Technique for Detecting Hardware Trojans Impacting Circuits Delay. IEEE Design & Test. 2013, 30(2): 26--34
    [7]
    H. Salmani, M. Tehranipoor. Layout-Aware Switching Activity Localization to Enhance Hardware Trojan Detection. IEEE Transactions on Information Forensics and Security. 2012, 7(1): 76--87
    [8]
    R. Rad, J. Plusquellic, M. Tehranipoor. Sensitivity analysis to hardware Trojans using power supply transient signals. In Proceedings of IEEE International Workshop on Hardware-Oriented Security and Trust(HOST). 2008:3--7
    [9]
    M. Banga, M. S. Hsiao. A Novel Sustained Vector Technique for the Detection of Hardware Trojans. In Proceedings of 22nd International Conference on VLSI Design. 2009:327--332
    [10]
    F. Wolff, C. Papachristou, S. Bhunia, et al. Towards Trojan-Free Trusted ICs: Problem Analysis and Detection Scheme. In Proceedings of Design, Automation and Test in Europe(DATE). 2008:1362--1365
    [11]
    R. S. Chakraborty, F. Wolff, S. Paul, et al. MERO: A Statistical Approach for Hardware Trojan Detection. In Proceedings of 11th International Workshop Cryptographic Hardware and Embedded Systems. 2009:396--410
    [12]
    R. S. Chakraborty, S. Paul, S. Bhunia. On-demand transparency for improving hardware Trojan detectability. In Proceedings of IEEE International Workshop on Hardware-Oriented Security and Trust(HOST). 2008:48--50
    [13]
    M. Potkonjak, A. Nahapetian, M. Nelson, et al. Hardware Trojan horse detection using gate-level characterization. In Proceedings of ACM/IEEE Design Automation Conference(DAC). 2009:688--693
    [14]
    S. Wei, M. Potkonjak. Self-Consistency and Consistency-Based Detection and Diagnosis of Malicious Circuitry IEEE Transactions on Very Large Scale Integration (VLSI) Systems. 2013, PP(99): 1--9
    [15]
    Y. Alkabani, F. Koushanfar. Consistency-based Characterization for IC Trojan detection. In Proceedings of International Conference on Computer-Aided Design(ICCAD). 2009:123--127
    [16]
    D. D. Wackerly, I. W. Mendenhall, R. L. Scheaffer. Mathematical Statistics With Application. 7th Edition, Thomson Learning, 2008

    Cited By

    View all
    • (2022)Hardware Trojan Detection using Transition Probability with Minimal Test VectorsACM Transactions on Embedded Computing Systems10.1145/354500022:1(1-21)Online publication date: 29-Oct-2022
    • (2021)TAALACM Transactions on Design Automation of Electronic Systems10.1145/344237926:4(1-22)Online publication date: 9-Mar-2021
    • (2021)Hardware Trojan Designs Based on High-Low Probability and Partitioned Combinational Logic With a Malicious Reset SignalIEEE Transactions on Circuits and Systems II: Express Briefs10.1109/TCSII.2020.304472168:6(2152-2156)Online publication date: Jun-2021
    • Show More Cited By

    Index Terms

    1. A low cost acceleration method for hardware trojan detection based on fan-out cone analysis

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      CODES '14: Proceedings of the 2014 International Conference on Hardware/Software Codesign and System Synthesis
      October 2014
      331 pages
      ISBN:9781450330510
      DOI:10.1145/2656075
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 12 October 2014

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. fan-out cone
      2. hardware trojan
      3. low cost
      4. signal probability
      5. transition probability

      Qualifiers

      • Research-article

      Funding Sources

      Conference

      ESWEEK'14
      ESWEEK'14: TENTH EMBEDDED SYSTEM WEEK
      October 12 - 17, 2014
      New Delhi, India

      Acceptance Rates

      Overall Acceptance Rate 280 of 864 submissions, 32%

      Upcoming Conference

      ESWEEK '24
      Twentieth Embedded Systems Week
      September 29 - October 4, 2024
      Raleigh , NC , USA

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)10
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 26 Jul 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2022)Hardware Trojan Detection using Transition Probability with Minimal Test VectorsACM Transactions on Embedded Computing Systems10.1145/354500022:1(1-21)Online publication date: 29-Oct-2022
      • (2021)TAALACM Transactions on Design Automation of Electronic Systems10.1145/344237926:4(1-22)Online publication date: 9-Mar-2021
      • (2021)Hardware Trojan Designs Based on High-Low Probability and Partitioned Combinational Logic With a Malicious Reset SignalIEEE Transactions on Circuits and Systems II: Express Briefs10.1109/TCSII.2020.304472168:6(2152-2156)Online publication date: Jun-2021
      • (2021)Enhancing Hardware Trojan Detection Sensitivity Using Partition-Based Shuffling SchemeIEEE Transactions on Circuits and Systems II: Express Briefs10.1109/TCSII.2020.300126368:1(266-270)Online publication date: Jan-2021
      • (2021)Hardware Trojan Free Netlist Identification: A Clustering ApproachJournal of Electronic Testing10.1007/s10836-021-05953-1Online publication date: 19-Jun-2021
      • (2020)Hardware Trojans in Chips: A Survey for Detection and PreventionSensors10.3390/s2018516520:18(5165)Online publication date: 10-Sep-2020
      • (2020)PMTP: A MAX-SAT-Based Approach to Detect Hardware Trojan Using Propagation of Maximum Transition ProbabilityIEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems10.1109/TCAD.2018.288966339:1(25-33)Online publication date: Jan-2020
      • (2020)SPARTA-COTS: A Laser Probing Approach for Sequential Trojan Detection in COTS Integrated Circuits2020 IEEE Physical Assurance and Inspection of Electronics (PAINE)10.1109/PAINE49178.2020.9337728(1-6)Online publication date: 15-Dec-2020
      • (2020)SPARTA: A Laser Probing Approach for Trojan Detection2020 IEEE International Test Conference (ITC)10.1109/ITC44778.2020.9325222(1-10)Online publication date: 1-Nov-2020
      • (2020)Analytical Estimation and Localization of Hardware Trojan Vulnerability in RTL Designs2020 21st International Symposium on Quality Electronic Design (ISQED)10.1109/ISQED48828.2020.9137024(149-154)Online publication date: Mar-2020
      • Show More Cited By

      View Options

      Get Access

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media