Hardware Trojan Detection through Information Flow Security Verification
Title | Hardware Trojan Detection through Information Flow Security Verification |
Publication Type | Conference Paper |
Year of Publication | 2017 |
Authors | Nahiyan, A., Sadi, M., Vittal, R., Contreras, G., Forte, D., Tehranipoor, M. |
Conference Name | 2017 IEEE International Test Conference (ITC) |
Date Published | oct |
ISBN Number | 978-1-5386-3413-4 |
Keywords | automatic test pattern generation, Benchmark testing, composability, cyber physical systems, Hardware, Hardware Trojan detection framework, industrial property, information flow security verification, intellectual property, invasive software, IP networks, Payloads, pubcrawl, resilience, Resiliency, security, time-to-market constraints, trojan horse detection, Trojan horses, trust-hub benchmarks, Trusted Computing, untrusted vendors |
Abstract | Semiconductor design houses are increasingly becoming dependent on third party vendors to procure intellectual property (IP) and meet time-to-market constraints. However, these third party IPs cannot be trusted as hardware Trojans can be maliciously inserted into them by untrusted vendors. While different approaches have been proposed to detect Trojans in third party IPs, their limitations have not been extensively studied. In this paper, we analyze the limitations of the state-of-the-art Trojan detection techniques and demonstrate with experimental results how to defeat these detection mechanisms. We then propose a Trojan detection framework based on information flow security (IFS) verification. Our framework detects violation of IFS policies caused by Trojans without the need of white-box knowledge of the IP. We experimentally validate the efficacy of our proposed technique by accurately identifying Trojans in the trust-hub benchmarks. We also demonstrate that our technique does not share the limitations of the previously proposed Trojan detection techniques. |
URL | https://ieeexplore.ieee.org/document/8242062/ |
DOI | 10.1109/TEST.2017.8242062 |
Citation Key | nahiyan_hardware_2017 |
- Payloads
- untrusted vendors
- Trusted Computing
- trust-hub benchmarks
- Trojan horses
- trojan horse detection
- time-to-market constraints
- security
- Resiliency
- resilience
- pubcrawl
- automatic test pattern generation
- IP networks
- invasive software
- intellectual property
- information flow security verification
- industrial property
- Hardware Trojan detection framework
- Hardware
- cyber physical systems
- composability
- Benchmark testing