Design, Automation &Amp; Test in Europe Conference &Amp; Exhibition (DATE), 2015 2015
DOI: 10.7873/date.2015.1102
|View full text |Cite
|
Sign up to set email alerts
|

New Testing Procedure for Finding Insertion Sites of Stealthy Hardware Trojans

Abstract: Hardware Trojans (HTs) are malicious alterations to a circuit. These modifications can be inserted either during the design phase or during the fabrication process. Due to the diversity of Hardware Trojans, detecting and/or locating them are challenging tasks. Numerous approaches have been proposed to address this problem. Methods based on logic testing consist in trying to activate potential HTs and detect erroneous outputs during test. However, HTs are stealthy in nature i.e. mostly inactive unless they are … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
28
0
1

Year Published

2016
2016
2022
2022

Publication Types

Select...
4
3

Relationship

1
6

Authors

Journals

citations
Cited by 21 publications
(29 citation statements)
references
References 14 publications
0
28
0
1
Order By: Relevance
“…The assumption of rareness is challenged for practical reasons (time complexity to derive an appropriate test suite, as discussed in [22]) as well as because rare triggering conditions can be constructed by combining conditions that are not so rare [23]. It is beneficial to shift the focus towards providing metrics of the coverage of the input vector space.…”
Section: Testing Based On Search Space Coveragementioning
confidence: 98%
“…The assumption of rareness is challenged for practical reasons (time complexity to derive an appropriate test suite, as discussed in [22]) as well as because rare triggering conditions can be constructed by combining conditions that are not so rare [23]. It is beneficial to shift the focus towards providing metrics of the coverage of the input vector space.…”
Section: Testing Based On Search Space Coveragementioning
confidence: 98%
“…Otherwise we must throw it away to avoid security leakage. For example, we can use the methods such as in [2], [5], [6], [11], [14], [19], which identify whether a given netlist is HT-inserted or not. If we can accurately identify whether the netlist is HT-inserted or not, we can decide whether to use it, redesign it, or throw it away.…”
Section: A Threat Casementioning
confidence: 99%
“…They are classified into anti-reverse engineering [10], [15], vulnerability analysis [13], HT detection [2], [4]- [6], [8], [11], [14], [16], [19], [21]. test point insertion [18], logic obfuscation [9], [12], HT prevention [20], and HT removing [7].…”
Section: A Previous Workmentioning
confidence: 99%
“…HTs detection methods on fabricated ICs are commonly divided into two categories: methods based on side-channel analysis [6][7][8], or logic testing [9][10][11]. In both cases the goal is to test ICs after fabrication to ensure that they are HT free.…”
Section: Introductionmentioning
confidence: 99%
“…Logic testing methods consist in activating potential HTs in order to provoke an error on circuit's outputs [9][10][11]. A HT model is presented in [9], decomposing the HT into to parts: the trigger and the payload (cf.…”
Section: Introductionmentioning
confidence: 99%