2015 IEEE International Test Conference (ITC) 2015
DOI: 10.1109/test.2015.7342417
|View full text |Cite
|
Sign up to set email alerts
|

FASTrust: Feature analysis for third-party IP trust verification

Abstract: Third-party intellectual property (3PIP) cores are widely used in integrated circuit designs and it is essential to ensure their trustworthiness. Existing hardware trust verification techniques suffer from high computational complexity, low extensibility, and inability to detect implicitly-triggered hardware trojans (HTs). To tackle the above problems, in this paper, we present a novel 3PIP trust verification framework, namely FASTrust, which conducts HT feature analysis on the flip-flop level control-data flo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
15
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 32 publications
(15 citation statements)
references
References 18 publications
0
15
0
Order By: Relevance
“…Further, Fern et al (2017) precisely define suspicious unspecified functionality and formulate the detection as a satisfiability problem. FASTrust, a feature analysis method on the flip-flop level CDFG, is introduced for identifying the malicious circuits (Yao et al 2015). Those feature based methods rely on the effective HTs features and easily cause a high false positive.…”
Section: Hardware Trojans Detectionmentioning
confidence: 99%
“…Further, Fern et al (2017) precisely define suspicious unspecified functionality and formulate the detection as a satisfiability problem. FASTrust, a feature analysis method on the flip-flop level CDFG, is introduced for identifying the malicious circuits (Yao et al 2015). Those feature based methods rely on the effective HTs features and easily cause a high false positive.…”
Section: Hardware Trojans Detectionmentioning
confidence: 99%
“…Recently, a number of hardware Trojan detection methods based on circuit feature analysis have been proposed. In [17], the authors propose a HT detection method named FASTrust. They construct the flip-flop level control data flow graphs (CDFGs) in which flip-flops, primitive inputs, as well as primitive outputs are abstracted as nodes and combinational logic circuits are abstracted as directed edges.…”
Section: Related Workmentioning
confidence: 99%
“…Usually a HT is quietly hidden in its host circuit and can only be triggered in rare conditions [5]. To detect the silent HTs, currently there are three categories of method: logic testing [6]- [10], side-channel analysis [11]- [16] and feature analysis [17]- [22]. Logic testing approaches [6]- [10] attempt to generate a large number of test vectors to activate unknown HTs and propagate their effects to the output ports.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…For the simple structures in SOP and POS, the Trojan circuits may be tracked by their structural pattern in feature analysis based detections [27,28,29,30], especially the bottom-up implementation of POS (POS-BU) where exists an AND-logic group. So we propose mixing these two structures showed in Fig.…”
Section: Structural Feature Analysismentioning
confidence: 99%