2019 22nd Euromicro Conference on Digital System Design (DSD) 2019
DOI: 10.1109/dsd.2019.00047
|View full text |Cite
|
Sign up to set email alerts
|

LAOCOÖN: A Run-Time Monitoring and Verification Approach for Hardware Trojan Detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 32 publications
0
3
0
Order By: Relevance
“…In [74], it is proposed to identify high-level and critical behavioral invariants of a processor inspired from assertion-based verification, and a Hardware Property Checker (HPC) is designed that verifies these invariants at run-time. Another approach uses temporal logic assertions to automatically synthesize monitor circuits [75]. A run-time detection of the A2 Trojan [27], [28] is proposed in [76] that works by guarding a set of concerned victim signals and initiating a hardware interrupt request when abnormal toggling events occur.…”
Section: Run-time Monitors For Ht Detectionmentioning
confidence: 99%
“…In [74], it is proposed to identify high-level and critical behavioral invariants of a processor inspired from assertion-based verification, and a Hardware Property Checker (HPC) is designed that verifies these invariants at run-time. Another approach uses temporal logic assertions to automatically synthesize monitor circuits [75]. A run-time detection of the A2 Trojan [27], [28] is proposed in [76] that works by guarding a set of concerned victim signals and initiating a hardware interrupt request when abnormal toggling events occur.…”
Section: Run-time Monitors For Ht Detectionmentioning
confidence: 99%
“…Ngo et al 20 implemented a hardware runtime property checker to verify important design properties. Danger et al 30 presented automatic monitoring generation to validate formal properties. Bilzor et al 31 discussed a method to create assertion‐based dynamic checkers as part of the processor's design.…”
Section: Literature Reviewmentioning
confidence: 99%
“…However, the hardware property checkers have some limitations 21,22,30 . For example, checkers cannot prevent a HT malicious activity, rather other system resources (e.g., processor) should manage the response in the event of a HT detection.…”
Section: Literature Reviewmentioning
confidence: 99%