2014 IEEE International Symposium on Circuits and Systems (ISCAS) 2014
DOI: 10.1109/iscas.2014.6865092
|View full text |Cite
|
Sign up to set email alerts
|

Applied formal methods for hardware Trojan detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2014
2014
2024
2024

Publication Types

Select...
4
3
1

Relationship

2
6

Authors

Journals

citations
Cited by 36 publications
(12 citation statements)
references
References 10 publications
0
8
0
Order By: Relevance
“…Security Verification can be used to detect certain types of HTs. It works by deriving formal security models for hardware designs and prove security properties such as confidentiality and integrity through formal approaches, e.g., SAT solving, model checking and type checking [222]- [224]. A security property violation indicates the existence of unintentional design flaw or intended malicious design modification.…”
Section: E Hardware Trojan Detection and Prevention Techniquesmentioning
confidence: 99%
“…Security Verification can be used to detect certain types of HTs. It works by deriving formal security models for hardware designs and prove security properties such as confidentiality and integrity through formal approaches, e.g., SAT solving, model checking and type checking [222]- [224]. A security property violation indicates the existence of unintentional design flaw or intended malicious design modification.…”
Section: E Hardware Trojan Detection and Prevention Techniquesmentioning
confidence: 99%
“…The limitations of code/structural analysis techniques are that they do not guarantee Trojan detection, and manual postprocessing is required to analyze suspicious signals or gates and determine if they are a part of a Trojan. -Formal verification is an algorithmic-based approach to logic verification that exhaustively proves a predefined set of security properties that a design should satisfy [Zhang and Tehranipoor 2011a;Rathmair et al 2014;Rajendran et al 2015]. To check if a design honors these properties, one converts the target design into a proofchecking format (e.g., Coq) [Love et al 2011].…”
Section: Trojan Detectionmentioning
confidence: 99%
“…The first author of this paper was the verification engineer in this team and brought in know-how and experience from applying such techniques in hardware design, more precisely circuit verification, see, e.g., [13].…”
Section: -Verification Engineermentioning
confidence: 99%