当前位置: X-MOL 学术IEEE Trans. Very Larg. Scale Integr. Syst. › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
AdaTrust: Combinational Hardware Trojan Detection Through Adaptive Test Pattern Construction
IEEE Transactions on Very Large Scale Integration (VLSI) Systems ( IF 2.8 ) Pub Date : 2021-02-10 , DOI: 10.1109/tvlsi.2021.3053553
Chris Nigh , Alex Orailoglu

As society becomes increasingly reliant on products and systems that make use of integrated circuits, the defense against potential hardware Trojan attacks by an untrusted foundry becomes an important part of any certification flow for critical components. The slew of recent proposals notwithstanding, a satisfactory solution is still wanting as the solutions offered heretofore either require impractical design/test pattern cost or deliver insufficient detection capabilities, primarily challenged by the noise induced by process variation. The methodology put forth by this proposal aims to remedy this, leveraging an adaptive approach that applies superposition to perform a fine-grained circuit analysis and expose any extant Trojan circuitry. Iterative test pattern modifications, circuit response analysis, and adaptive decision-making are deployed, all embedded within the design-for-test and test pattern cost paradigms of a common industrial circuit. We demonstrate the efficacy of this technique on standard Trust-Hub benchmark circuits with combinational Trojans inserted in sequential designs, showing significant improvement over prior techniques. We also explore the potential cost–benefit tradeoffs that exist within such a methodology, with the intent to provide an efficient solution for an array of potential product markets. This methodology provides a reliable and effective means for Trojan detection, addressing an important piece of the overall circuit certification puzzle.

中文翻译:

AdaTrust:通过自适应测试模式构建的组合式硬件木马检测

随着社会越来越依赖于使用集成电路的产品和系统,防御不受信任的代工厂的潜在木马特洛伊木马攻击已成为任何关键组件认证流程的重要组成部分。尽管有许多最新的提议,但仍需要令人满意的解决方案,因为迄今为止提供的解决方案要么需要不切实际的设计/测试图案成本,要么提供不足的检测能力,这主要受到工艺变化所引起的噪声的挑战。该提案提出的方法旨在对此加以补救,利用一种自适应方法,该方法应用叠加来执行细粒度的电路分析并公开任何现存的Trojan电路。部署了迭代测试模式修改,电路响应分析和自适应决策,所有这些都嵌入了通用工业电路的测试设计和测试模式成本范式中。我们证明了此技术在标准Trust-Hub基准电路上的有效性,并在顺序设计中插入了组合式特洛伊木马,显示出对现有技术的显着改进。我们还探讨了这种方法中存在的潜在成本-收益权衡,目的是为一系列潜在产品市场提供有效的解决方案。这种方法为木马检测提供了可靠而有效的方法,解决了整个电路认证难题中的重要部分。我们证明了此技术在标准Trust-Hub基准电路上的有效性,并在顺序设计中插入了组合式特洛伊木马,显示出对现有技术的显着改进。我们还探讨了这种方法中存在的潜在成本-收益权衡,目的是为一系列潜在产品市场提供有效的解决方案。这种方法为木马检测提供了可靠而有效的方法,解决了整个电路认证难题中的重要部分。我们证明了此技术在标准Trust-Hub基准电路上的有效性,并在顺序设计中插入了组合式特洛伊木马,显示出对现有技术的显着改进。我们还探讨了这种方法中存在的潜在成本-收益权衡,目的是为一系列潜在产品市场提供有效的解决方案。这种方法为木马检测提供了可靠而有效的方法,解决了整个电路认证难题中的重要部分。
更新日期:2021-02-26
down
wechat
bug