Hardware Trojan detection and classification based on steady state learning

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Abstract

In this paper, we propose a logic-testing based HT detection and classification method utilizing steady state learning. We first observe that HTs are hidden while applying random test patterns in a short time but most of them can be activated in a very long-term random circuit operation. Hence it is very natural that we learn steady signal-transition states of every suspicious Trojan net in a netlist by performing short-term random simulation. After that, we simulate or emulate the netlist in a very long time by giving random test patterns and obtain a set of signal-transition states. By discovering correlation between them, our method detects HTs and finds out its behavior. Experimental results demonstrate that our method can successfully identify all the real Trojan nets to be Trojan nets and all the normal nets to be normal nets, while other existing logic-testing HT detection methods cannot detect some of them.

Original languageEnglish
Title of host publication2017 IEEE 23rd International Symposium on On-Line Testing and Robust System Design, IOLTS 2017
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages215-220
Number of pages6
ISBN (Electronic)9781538603512
DOIs
Publication statusPublished - 2017 Sept 19
Event23rd IEEE International Symposium on On-Line Testing and Robust System Design, IOLTS 2017 - Thessaloniki, Greece
Duration: 2017 Jul 32017 Jul 5

Publication series

Name2017 IEEE 23rd International Symposium on On-Line Testing and Robust System Design, IOLTS 2017

Other

Other23rd IEEE International Symposium on On-Line Testing and Robust System Design, IOLTS 2017
Country/TerritoryGreece
CityThessaloniki
Period17/7/317/7/5

Keywords

  • Gate-level netlist
  • Hardware Trojans
  • Logic test
  • Signal transition
  • Steady state

ASJC Scopus subject areas

  • Electrical and Electronic Engineering
  • Safety, Risk, Reliability and Quality
  • Computer Networks and Communications
  • Hardware and Architecture
  • Control and Systems Engineering

Fingerprint

Dive into the research topics of 'Hardware Trojan detection and classification based on steady state learning'. Together they form a unique fingerprint.

Cite this