2015
DOI: 10.1109/tcad.2015.2422836
|View full text |Cite
|
Sign up to set email alerts
|

VeriTrust: Verification for Hardware Trust

Abstract: Hardware Trojans (HTs) implemented by adversaries serve as backdoors to subvert or augment the normal operation of infected devices, which may lead to functionality changes, sensitive information leakages, or Denial of Service attacks. To tackle such threats, this paper proposes a novel verification technique for hardware trust, namely VeriTrust, which facilitates to detect HTs inserted at design stage. Based on the observation that HTs are usually activated by dedicated trigger inputs that are not sensitized … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
124
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 168 publications
(125 citation statements)
references
References 31 publications
1
124
0
Order By: Relevance
“…Notice that all these St-D Trojans have a very low value 5. Not all of the benchmarks from TrustHub are listed in TABLE 1, because some of them have no payload, such as RS232-T200.…”
Section: Characterizing Trusthub Benchmarksmentioning
confidence: 99%
See 2 more Smart Citations
“…Notice that all these St-D Trojans have a very low value 5. Not all of the benchmarks from TrustHub are listed in TABLE 1, because some of them have no payload, such as RS232-T200.…”
Section: Characterizing Trusthub Benchmarksmentioning
confidence: 99%
“…Recent works have mostly focused on detection [17] and identification schemes [18], which assess to what extent the pieces of hardware may be vulnerable, and how related trojans can be classified. State of the art HT detection schemes include UCI [2], VeriTrust [5], FANCI [6] and DeTrust [8]. Typically, HT detection techniques only show their detection capabilities for HTs from the TrustHub benchmarks suite, in which all trojans are explicitly triggered.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Since CAD tools have complete information of the entire chip design, it is possible for them to strategically insert Trojans such that the Trojan detection circuitry cannot detect them (e.g., a Trojan is inserted in both the main function and in the OCP such that predicted check bits and actual check bits are still equal). Verification-based methods for detecting Trojans can be used [14] [104] but are prone to false-negatives (i.e., the Trojan may not be detected). It is likely that all fabricated chips will contain such Trojans; thus, these Trojans can be detected by destructively testing a few chips after fabrication (Section VII.…”
Section: Prevention Of Cad Tool Attacksmentioning
confidence: 99%
“…On the other hand, pre-silicon design methods often detect HTs on gated level netlists, which can be categorized into two types: the dynamic and static detection. Dynamic detection techniques [3,4,5,6] generally judge a circuit according to the activation of HT parts. However, HTs are often latent and rarely activated under ordinary functional verification constrains thus hard to discover.…”
Section: Introductionmentioning
confidence: 99%