Advancing the State-of-the-Art in Hardware Trojans Design.

IEEE Transactions on Dependable and Secure Computing(2017)

引用 36|浏览110
暂无评分
摘要
Over the past decade, Hardware Trojans (HTs) research community has made significant progress towards developing effective countermeasures for various types of HTs, yet these countermeasures are shown to be circumvented by sophisticated HTs designed subsequently. Therefore, instead of guaranteeing a certain (low) false negative rate for a small constant set of publicly known HTs, a rigorous security framework of HTs should provide an effective algorithm to detect any HT from an exponentially large class (exponential in number of wires in IP core) of HTs with negligible false negative rate. In this work, we present HaTCh, the first rigorous algorithm of HT detection within the paradigm of pre-silicon logic testing based tools. HaTCh detects any HT from $H_D$ , a huge class of deterministic HTs which is orders of magnitude larger than the small subclass (e.g., TrustHub) considered in the current literature. We prove that HaTCh offers negligible false negative rate and controllable false positive rate for the class $H_D$ . Given certain global characteristics regarding the stealthiness of the HT within $H_D$ , the computational complexity of HaTCh for practical HTs scales polynomially with the number of wires in the IP core. We implement and test HaTCh on TrustHub and other sophisticated HTs.
更多
查看译文
关键词
IP networks,Trojan horses,High definition video,Hardware,Wires,Payloads,Security
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要