Visible to the public Applied formal methods for hardware Trojan detection

TitleApplied formal methods for hardware Trojan detection
Publication TypeConference Paper
Year of Publication2014
AuthorsRathmair, M., Schupfer, F., Krieg, C.
Conference NameCircuits and Systems (ISCAS), 2014 IEEE International Symposium on
Date PublishedJune
Keywordschip development process, data structures, design phase, electronic engineering computing, Equations, formal hardware Trojan detection, formal methods, formal verification, Hardware, integrated circuit design, integrated circuits, invasive software, malicious hardware modifications, Mathematical model, model checking, silicon structure, Trojan assurance level, Trojan horses, Vectors, verification techniques
Abstract

This paper addresses the potential danger using integrated circuits which contain malicious hardware modifications hidden in the silicon structure. A so called hardware Trojan may be added at several stages of the chip development process. This work concentrates on formal hardware Trojan detection during the design phase and highlights applied verification techniques. Selected methods are discussed and their combination used to increase an introduced "Trojan Assurance Level".

DOI10.1109/ISCAS.2014.6865092
Citation Key6865092