VeriTrust: Verification for Hardware Trust
Top Cited Papers
- 14 April 2015
- journal article
- Published by Institute of Electrical and Electronics Engineers (IEEE) in IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems
- Vol. 34 (7), 1148-1161
- https://doi.org/10.1109/tcad.2015.2422836
Abstract
Today's integrated circuit designs are vulnerable to a wide range of malicious alterations, namely hardware Trojans (HTs). HTs serve as backdoors to subvert or augment the normal operation of infected devices, which may lead to functionality changes, sensitive information leakages, or denial of service attacks. To tackle such threats, this paper proposes a novel verification technique for hardware trust, namely VeriTrust, which facilitates to detect HTs inserted at design stage. Based on the observation that HTs are usually activated by dedicated trigger inputs that are not sensitized with verification test cases, VeriTrust automatically identifies such potential HT trigger inputs by examining verification corners. The key difference between VeriTrust and existing HT detection techniques based on “unused circuit identification” is that VeriTrust is insensitive to the implementation style of HTs. Experimental results show that VeriTrust is able to detect all HTs evaluated in this paper (constructed based on various HT design methodologies shown in this paper) at the cost of moderate extra verification time.Keywords
Funding Information
- Chinese University of Hong Kong (4055049)
- National Science Foundation of China Key (61432017)
This publication has 27 references indexed in Scilit:
- DeTrustPublished by Association for Computing Machinery (ACM) ,2014
- On Trojan side channel design and identificationPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2014
- On hardware Trojan design and implementation at register-transfer levelPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2013
- Hardware Trojan horse benchmark via optimal creation and placement of malicious circuitryPublished by Association for Computing Machinery (ACM) ,2012
- Integrated circuit security techniques using variable supply voltagePublished by Association for Computing Machinery (ACM) ,2011
- A case study in hardware Trojan design and implementationInternational Journal of Information Security, 2010
- A Unified Submodular Framework for Multimodal IC Trojan DetectionLecture Notes in Computer Science, 2010
- Trust-Based Design and Check of FPGA Circuits Using Two-Level Randomized ECC StructuresACM Transactions on Reconfigurable Technology and Systems, 2009
- Formal verification in hardware designACM Transactions on Design Automation of Electronic Systems, 1999
- The Synthesis of Two-Terminal Switching CircuitsBell System Technical Journal, 1949