2013 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFTS) 2013
DOI: 10.1109/dft.2013.6653605
|View full text |Cite
|
Sign up to set email alerts
|

Analyzing circuit vulnerability to hardware Trojan insertion at the behavioral level

Abstract: Considerable attention has been paid to hardware Trojan detection and prevention. However, there is no existing systematic approach to investigate circuit vulnerability to hardware Trojan insertion during development. We present such an approach to investigate circuit vulnerability to Trojan insertion at the behavioral level. This novel vulnerability analysis determines a circuit's susceptibility to Trojan insertion based on statement hardness analysis as well as observability of circuit signals. Further, the … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
20
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
5
3
2

Relationship

1
9

Authors

Journals

citations
Cited by 65 publications
(20 citation statements)
references
References 15 publications
0
20
0
Order By: Relevance
“…A malicious 3PIP can use such features to create a behavioral Trojan that is difficult to trigger and whose effects cannot be observed at the outputs on regular functional testing. In order to quantify such vulnerabilities, we have proposed two broad metrics [20]: -Statement Hardness: This metric analyzes the rarity of the conditions under which a statement executes in RTL code. This metric is quantified by (…”
Section: Vulnerability Analysis At the Rtl Levelmentioning
confidence: 99%
“…A malicious 3PIP can use such features to create a behavioral Trojan that is difficult to trigger and whose effects cannot be observed at the outputs on regular functional testing. In order to quantify such vulnerabilities, we have proposed two broad metrics [20]: -Statement Hardness: This metric analyzes the rarity of the conditions under which a statement executes in RTL code. This metric is quantified by (…”
Section: Vulnerability Analysis At the Rtl Levelmentioning
confidence: 99%
“…Request permissions from Permissions@acm.org. DAC ' Alternately, an SoC integrator may automatically analyze the 3PIP code and mark suspicious signals using controllability and reachability values of signals [7]. FANCI marks gates with low activation probability as suspicious [8].…”
Section: Previous Workmentioning
confidence: 99%
“…Alternately, an SoC integrator may automatically analyze the 3PIP code and mark suspicious signals using the controllability and reachability analysis [19]. Functional Analysis for Nearly-unused Circuit Identification (FANCI) marks gates with low activation probability as suspicious [20].…”
Section: B Previous Workmentioning
confidence: 99%