Paper 2014/943
Advancing the State-of-the-Art in Hardware Trojans Detection
Syed Kamran Haider, Chenglu Jin, Masab Ahmad, Devu Manikantan Shila, Omer Khan, and Marten van Dijk
Abstract
Over the past decade, Hardware Trojans (HTs) research community has made significant progress towards developing effective countermeasures for various types of HTs, yet these countermeasures are shown to be circumvented by sophisticated HTs designed subsequently. Therefore, instead of guaranteeing a certain (low) false negative rate for a small \textit{constant} set of publicly known HTs, a rigorous security framework of HTs should provide an effective algorithm to detect any HT from an \textit{exponentially large} class (exponential in number of wires in IP core) of HTs with negligible false negative rate.
In this work, we present HaTCh, the first rigorous algorithm of HT detection within the paradigm of pre-silicon logic testing based tools. HaTCh detects any HT from
Note: Included the Explicit vs. Implicit malicious behavior and the probability \alpha which caused several major changes.
Metadata
- Available format(s)
-
PDF
- Publication info
- Preprint. MAJOR revision.
- Keywords
- Hardware TrojansSecurityIP Cores
- Contact author(s)
- syed haider @ uconn edu
- History
- 2016-06-16: last of 4 revisions
- 2014-11-18: received
- See all versions
- Short URL
- https://ia.cr/2014/943
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2014/943, author = {Syed Kamran Haider and Chenglu Jin and Masab Ahmad and Devu Manikantan Shila and Omer Khan and Marten van Dijk}, title = {Advancing the State-of-the-Art in Hardware Trojans Detection}, howpublished = {Cryptology {ePrint} Archive, Paper 2014/943}, year = {2014}, url = {https://eprint.iacr.org/2014/943} }