当前位置: X-MOL 学术Electron. Lett. › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
A Graph-based Approach Towards HardwareTrojan Vulnerability Analysis
Electronics Letters ( IF 1.1 ) Pub Date : 2020-08-01 , DOI: 10.1049/el.2020.1005
S.A. Islam 1
Affiliation  

The author proposes an incremental windowing technique based on graph technique to detect hardware Trojan triggering signal. First, they analyse the switching activity file generated during simulation. Then, based on the window size of choice, they extract paths of n-HT (n-hardware Trojan; n is the number of triggering signals) and compare the path information with the HT instances from HT database to determine HTs' earliest/farthest activation time. They experiment with the incremental windowing technique on 420 combinational HT instances for four combinational designs. The results indicate that small and stealthy HT is active for a limited set of the time window and the number of test patterns during these windows is compact instead of exhaustive traditional random vector based Automatic Test Pattern Generation (ATPG).

中文翻译:

基于图的硬件木马漏洞分析方法

作者提出了一种基于图技术的增量加窗技术来检测硬件木马触发信号。首先,他们分析仿真期间生成的开关活动文件。然后,根据选择的窗口大小,提取n-HT(n-硬件木马;n为触发信号数量)的路径,并将路径信息与HT数据库中的HT实例进行比较,以确定HT的最早/最远激活时间。他们在 420 个组合 HT 实例上试验了四种组合设计的增量加窗技术。结果表明,小而隐蔽的 HT 在有限的一组时间窗口内处于活动状态,并且这些窗口期间的测试模式数量是紧凑的,而不是详尽的传统基于随机向量的自动测试模式生成 (ATPG)。
更新日期:2020-08-01
down
wechat
bug