z-logo
open-access-imgOpen Access
Circuit enclaves susceptible to hardware Trojans insertion at gate‐level designs
Author(s) -
Sebt Seyed Mohammad,
Patooghy Ahmad,
Beitollahi Hakem,
Kinsy Michel
Publication year - 2018
Publication title -
iet computers and digital techniques
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.219
H-Index - 46
ISSN - 1751-861X
DOI - 10.1049/iet-cdt.2018.5108
Subject(s) - hardware trojan , computer science , observability , controllability , electronic circuit , embedded system , benchmark (surveying) , netlist , speedup , integrated circuit , trojan , logic gate , computer hardware , computer engineering , parallel computing , algorithm , engineering , mathematics , electrical engineering , computer security , geodesy , geography , operating system
A hardware Trojan (HT) is an extra circuitry inserted into a chip design with the malicious aim of functionality alteration, reliability degradation or secret information leakage. It is normally very hard to find HT activation signals since such signals are intended to activate upon occurring very rare conditions on specific nets of the infected circuit. A security engineer would have to search among thousands of gates and modules to make sure about the non‐existence of design‐time HTs in the circuit. The authors propose efficient net susceptibility metrics to significantly speedup functional‐HT detection in gate‐level digital designs. The proposed metrics perform a computationally low overhead analysis on the controllability and observability parameters of each net of the under HT‐test circuit. Then, using a proposed net classifier method, a very low percentage of circuit nets is determined as HT trigger suspicious nets. To show practicality and detection accuracy of the proposed metrics, gate‐level circuits of Trust‐HUB benchmark suite are examined by the proposed metrics. Results confirm a 100% HT trigger detection with a low false positive as compared with previous metrics. More importantly, unlike previously proposed methods, the authors detection accuracy is totally independent of the switching probability of circuit inputs.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here