Modern digital integrated circuits (ICs) are often designed and fabricated by third parties and tools, which can make IC design/ fabrication vulnerable to malicious modifications. The malicious circuits are generally referred to as hardware Trojans (HTs) and they are considered to be a serious security concern. In this paper, we propose a logic-Testing based HT detection and classification method utilizing steady state learning. We first observe that HTs are hidden while applying random test patterns in a short time but most of them can be activated in a very long-Term random circuit operation. Hence it is very natural that we learn steady signal-Transition states of every suspicious Trojan net in a netlist by performing short-Term random simulation. After that, we simulate or emulate the netlist in a very long time by giving random test patterns and obtain a set of signal-Transition states. By discovering correlation between them, our method detects HTs and finds out its behavior. HTs sometimes do not affect primary outputs but just leak information over side channels. Our method can be successfully applied to those types of HTs. Experimental results demonstrate that our method can successfully identify all the real Trojan nets to be Trojan nets and all the normal nets to be normal nets, while other existing logic-Testing HT detection methods cannot detect some of them. Moreover, our method can successfully detect HTs even if they are not really activated during long-Term random simulation. Our method also correctly guesses the HT behavior utilizing signal transition learning.
|ジャーナル||IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences|
|出版物ステータス||Published - 2018 12 1|
ASJC Scopus subject areas
- Signal Processing
- Computer Graphics and Computer-Aided Design
- Electrical and Electronic Engineering
- Applied Mathematics