Loading...

Hardware trojan detection based on logical testing

Bazzazi, A ; Sharif University of Technology | 2017

637 Viewed
  1. Type of Document: Article
  2. DOI: 10.1007/s10836-017-5670-0
  3. Publisher: Springer New York LLC , 2017
  4. Abstract:
  5. In recent years, hardware Trojans (HTs) have become one of the main challenging concerns within the chain of manufacturing digital integrated circuit chips. Because of their diversity in chips, HTs are difficult to detect and locate. This paper attempted to propose a new improved method for detection and localization of HTs based on the real-time logical values of nodes. The algorithm extracts the nodes with special attributes. At the next stage, the nodes with the greatest similarity in terms of logical value are selected as targets. Depending on the size of the circuit, the extraction continues until a sufficient number of similar nodes has been selected. The logical relationship between the candidate nodes yields a function, the logical values of which differ in the Trojan-free and Trojan-infected modes, thus detecting the potential Trojans. This method is scalable, overcoming the problems of noise and Process variation. The success rate of Trojan detection in this method is more than 80%. The most overhead is 13% for power consumption and 15% for area. © 2017, Springer Science+Business Media, LLC
  6. Keywords:
  7. Hardware Trojans ; Runtime ; Trojan localization ; Digital integrated circuits ; Hardware ; Hardware security ; Detection and localization ; Detection methods ; Hardware Trojan detection ; Logic testing ; Logical relationships ; Runtimes ; Trojan detections ; Trojans ; Malware
  8. Source: Journal of Electronic Testing: Theory and Applications (JETTA) ; Volume 33, Issue 4 , 2017 , Pages 381-395 ; 09238174 (ISSN)
  9. URL: https://link.springer.com/article/10.1007%2Fs10836-017-5670-0