Applied formal methods for hardware Trojan detection
Title | Applied formal methods for hardware Trojan detection |
Publication Type | Conference Paper |
Year of Publication | 2014 |
Authors | Rathmair, M., Schupfer, F., Krieg, C. |
Conference Name | Circuits and Systems (ISCAS), 2014 IEEE International Symposium on |
Date Published | June |
Keywords | chip development process, data structures, design phase, electronic engineering computing, Equations, formal hardware Trojan detection, formal methods, formal verification, Hardware, integrated circuit design, integrated circuits, invasive software, malicious hardware modifications, Mathematical model, model checking, silicon structure, Trojan assurance level, Trojan horses, Vectors, verification techniques |
Abstract | This paper addresses the potential danger using integrated circuits which contain malicious hardware modifications hidden in the silicon structure. A so called hardware Trojan may be added at several stages of the chip development process. This work concentrates on formal hardware Trojan detection during the design phase and highlights applied verification techniques. Selected methods are discussed and their combination used to increase an introduced "Trojan Assurance Level". |
DOI | 10.1109/ISCAS.2014.6865092 |
Citation Key | 6865092 |
- integrated circuits
- verification techniques
- Vectors
- Trojan horses
- Trojan assurance level
- silicon structure
- model checking
- Mathematical model
- malicious hardware modifications
- invasive software
- chip development process
- integrated circuit design
- Hardware
- formal verification
- formal methods
- formal hardware Trojan detection
- Equations
- electronic engineering computing
- design phase
- data structures