2017 IEEE/ACM International Conference on Computer-Aided Design (ICCAD) 2017
DOI: 10.1109/iccad.2017.8203846
|View full text |Cite
|
Sign up to set email alerts
|

Why you should care about don't cares: Exploiting internal don't care conditions for hardware Trojans

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

1
34
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 16 publications
(35 citation statements)
references
References 23 publications
1
34
0
Order By: Relevance
“…This Trojan can survive from design verification since the design with the Trojan is equivalent to the specification before deployment on hardware. Hu et al used internal don't-care conditions for malicious design modifications [15]. Their idea was to use internal design states that will never be satisfied (e.g., two signals cannot be logical 1 at the same time) in normal operation as Trojan trigger.…”
Section: B Don't-care Hardware Trojansmentioning
confidence: 99%
See 2 more Smart Citations
“…This Trojan can survive from design verification since the design with the Trojan is equivalent to the specification before deployment on hardware. Hu et al used internal don't-care conditions for malicious design modifications [15]. Their idea was to use internal design states that will never be satisfied (e.g., two signals cannot be logical 1 at the same time) in normal operation as Trojan trigger.…”
Section: B Don't-care Hardware Trojansmentioning
confidence: 99%
“…Hu et al introduced the idea of using an SDC signal pair to create two discrete trigger signals [15]. In Fig.…”
Section: A Satisfiability Don't-care Hardware Trojanmentioning
confidence: 99%
See 1 more Smart Citation
“…For Trojan research, many Trojan benchmarks have been proposed [6,7,8,9,10,11,12,13,14,15,16]. To keep dormant in functional verification, hardware Trojan is usually triggered by some rare conditions, which is the so-called trigger condition.…”
Section: Introductionmentioning
confidence: 99%
“…In the existing Trojan benchmarks, the trigger part and payload part are designed separately and the rare-triggered condition is implemented by a combination of several low-activity or low testability signals, which may be detected by logic analysis techniques [17,18,19,20]. The traditional digital Trojan design methodology can be divided into two categories, the first exploits the rare transition signals in the original design [6,7,9,15], and the second attempts to partition the Trojan circuit into smaller parts and stages [12,14]. A uniform distribution of states is acquired by linear feedback shift register in [8], but low transition wire is still created when generating rare condition by combinational circuits.…”
Section: Introductionmentioning
confidence: 99%