2018 IEEE International Test Conference (ITC) 2018
DOI: 10.1109/test.2018.8624854
|View full text |Cite
|
Sign up to set email alerts
|

Scalable Hardware Trojan Activation by Interleaving Concrete Simulation and Symbolic Execution

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
9
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 32 publications
(9 citation statements)
references
References 47 publications
0
9
0
Order By: Relevance
“…We also adopt the "sensitivity" from [20] as a metric, which refers to the scaled delay difference between the DUT and golden design. The sensitivity is defined as: sensitivity= difference/delay{; 1 it*)) (2) where f* refers to the register producing the maximum delay difference, and t* refers to the test producing the maximum delay difference.…”
Section: Methodsmentioning
confidence: 99%
See 2 more Smart Citations
“…We also adopt the "sensitivity" from [20] as a metric, which refers to the scaled delay difference between the DUT and golden design. The sensitivity is defined as: sensitivity= difference/delay{; 1 it*)) (2) where f* refers to the register producing the maximum delay difference, and t* refers to the test producing the maximum delay difference.…”
Section: Methodsmentioning
confidence: 99%
“…Existing Trojan detection techniques can be broadly classified into two categories: logic testing and side-channel analysis. Logic testing methods such as Automatic Test Pattern Generation (ATPG) [2] or statistical test generation [ 4,15] try to activate Trojans using generated tests, but they have two major limitations: (1) They suffer from high computational complexity for large designs. (2) Since it is infeasible to generate all possible input patterns, the generated tests are not effective in activating stealthy Trojans.…”
mentioning
confidence: 99%
See 1 more Smart Citation
“…Logic testing is a reliable method that is independent of process variations, which is robust against process variations and noise margins [16,17]. It activates HTs by applying test vectors and compares the responses with the correct results.…”
Section: Introductionmentioning
confidence: 99%
“…Therefore, verifying the security aspects of HLS IPs is crucial for CSPs to ensure accurate functionality. [8] Gate level ATPG binning + SAT formulation ISCAS85, ISCAS89, ITC99 ✗ Huang et al [28] Gate level Guided ATPG ISCAS85, ISCAS89 ✗ Liu et al [45] Gate level Genetic algorithm + SMT formulation TrustHub [55] ✗ Ahmed et al [5] Register transfer level Concolic testing TrustHub [55] ✓ Ahmed et al [4] Register Transfer Level Greedy concolic testing TrustHub [55] ✓ Lyu et al [44] Register Transfer Level Parallelism + concolic testing TrustHub [55] ✓ Veerana et al [58] HLS/SystemC Property checking S3C [59] ✓ Le et al [36] HLS/SystemC Guided greybox fuzzing S3C [59] ✗ Bin et al [38] HLS/SystemC Selective concolic testing S3C [59] ✗ Vafaei et al [57] C-level(from RTL) Symbolic Execution TrustHub [55] ✓ GreyConE [19] HLS/SystemC,C/C++ Greybox Fuzzing(GF) + Concolic Execution(CE) S3C [59],S2C [51] ✗ GreyConE+(Ours) HLS/SystemC,C/C++ Selective Instrumentation with GF + CE S3C [59], S2C [51],SC [40],Rosetta [66] ✓ functionalities like Trojans in IP designs introduces potential threats, including the risk of IP malfunctions, leakage of sensitive information, and potential damage to underlying hardware [48,58]. Vulnerabilities within third party HLS IPs might arise during the design phase, presenting similarities to security challenges encountered in untrusted electronics supply chains and the insertion of Trojans in pre-silicon hardware.…”
Section: Introductionmentioning
confidence: 99%