TY - JOUR
T1 - Hardware-trojans rank
T2 - Quantitative evaluation of security threats at gate-level netlists by pattern matching
AU - Oya, Masaru
AU - Yamashita, Noritaka
AU - Okamura, Toshihiko
AU - Tsunoo, Yukiyasu
AU - Yanagisawa, Masao
AU - Togawa, Nozomu
N1 - Publisher Copyright:
Copyright © 2016 The Institute of Electronics, Information and Communication Engineers.
PY - 2016/12
Y1 - 2016/12
N2 - Since digital ICs are often designed and fabricated by third parties at any phases today, we must eliminate risks that malicious attackers may implement Hardware Trojans (HTs) on them. In particular, they can easily insert HTs during design phase. This paper proposes an HT rank which is a new quantitative analysis criterion against HTs at gate-level netlists. We have carefully analyzed all the gate-level netlists in Trust-HUB benchmark suite and found out several Trojan net features in them. Then we design the three types of Trojan points: feature point, count point, and location point. By assigning these points to every net and summing up them, we have the maximum Trojan point in a gate-level netlist. This point gives our HT rank. The HT rank can be calculated just by net features and we do not perform any logic simulation nor random test. When all the gate-level netlists in Trust-HUB, ISCAS85, ISCAS89 and ITC99 benchmark suites as well as several OpenCores designs, HT-free and HT-inserted AES netlists are ranked by our HT rank, we can completely distinguish HT-inserted ones (which HT rank is ten or more) from HT-free ones (which HT rank is nine or less). The HT rank is the world-first quantitative criterion which distinguishes HT-inserted netlists from HT-free ones in all the gate-level netlists in Trust-HUB, ISCAS85, ISCAS89, and ITC99.
AB - Since digital ICs are often designed and fabricated by third parties at any phases today, we must eliminate risks that malicious attackers may implement Hardware Trojans (HTs) on them. In particular, they can easily insert HTs during design phase. This paper proposes an HT rank which is a new quantitative analysis criterion against HTs at gate-level netlists. We have carefully analyzed all the gate-level netlists in Trust-HUB benchmark suite and found out several Trojan net features in them. Then we design the three types of Trojan points: feature point, count point, and location point. By assigning these points to every net and summing up them, we have the maximum Trojan point in a gate-level netlist. This point gives our HT rank. The HT rank can be calculated just by net features and we do not perform any logic simulation nor random test. When all the gate-level netlists in Trust-HUB, ISCAS85, ISCAS89 and ITC99 benchmark suites as well as several OpenCores designs, HT-free and HT-inserted AES netlists are ranked by our HT rank, we can completely distinguish HT-inserted ones (which HT rank is ten or more) from HT-free ones (which HT rank is nine or less). The HT rank is the world-first quantitative criterion which distinguishes HT-inserted netlists from HT-free ones in all the gate-level netlists in Trust-HUB, ISCAS85, ISCAS89, and ITC99.
KW - A quantitative criterion
KW - Design phase
KW - Gate-level netlist
KW - Hardware Trojans
KW - Pattern matching
UR - http://www.scopus.com/inward/record.url?scp=84999143190&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84999143190&partnerID=8YFLogxK
U2 - 10.1587/transfun.E99.A.2335
DO - 10.1587/transfun.E99.A.2335
M3 - Article
AN - SCOPUS:84999143190
SN - 0916-8508
VL - E99A
SP - 2335
EP - 2347
JO - IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
JF - IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
IS - 12
ER -