To meet the above mentioned goals, we present HaTCh, the first rigorous framework of HT design and detection within the paradigm of pre-silicon logic testing based tools. We first introduce certain crucial properties of HTs which lead to the characterization of an exponentially large class of HTs that an adversary can (but is not limited to) design, for which we present a detection algorithm which detects any HT from this class with overwhelming probability $1-negl(\lambda)$. Given certain global characteristics regarding the stealthiness of a HT within this class, the computational complexity of our algorithm scales polynomially with the number of wires in the IP core, as opposed to the exponential (in number of IP core inputs) complexity of current state of the art detection schemes to detect such HTs. We have implemented this algorithm, compared it with existing countermeasures, and tested it on TrustHub HT benchmarks, previously proposed HTs which alleviate state of the art detection schemes, and also on a newly designed advanced HT. We argue that those HTs that fall outside the characterized class use HT design principles that allow HTs which can never be detected within the pre-silicon logic testing based paradigm.
Category / Keywords: Hardware Trojans, Security, IP Cores Date: received 16 Nov 2014, last revised 5 Oct 2015 Contact author: syed haider at uconn edu Available format(s): PDF | BibTeX Citation Note: Included the Explicit vs. Implicit malicious behavior and the probability \alpha which caused several major changes. Version: 20151006:022925 (All versions of this report) Short URL: ia.cr/2014/943 Discussion forum: Show discussion | Start new discussion