Combinational Hardware Trojan Detection Using Logic Implications
Title | Combinational Hardware Trojan Detection Using Logic Implications |
Publication Type | Conference Paper |
Year of Publication | 2017 |
Authors | Cornell, N., Nepal, K. |
Conference Name | 2017 IEEE 60th International Midwest Symposium on Circuits and Systems (MWSCAS) |
Date Published | aug |
ISBN Number | 978-1-5090-6389-5 |
Keywords | combinational circuits, combinational hardware trojan detection, composability, cyber physical systems, Hardware, Integrated circuit modeling, invasive software, logic design, Logic gates, logic simulation, logical implications, Payloads, potential benefit, proof-of-concept demonstration, pubcrawl, resilience, Resiliency, security, trojan horse detection, Trojan horses, valid logic implications |
Abstract | This paper provides a proof-of-concept demonstration of the potential benefit of using logical implications for detection of combinational hardware trojans. Using logic simulation, valid logic implications are selected and added to to the checker circuitry to detect payload delivery by a combinational hardware trojan. Using combinational circuits from the ISCAS benchmark suite, and a modest hardware budget for the checker, simulation results show that the probability of a trojan escaping detection using our approach was only 16%. |
URL | https://ieeexplore.ieee.org/document/8052987/ |
DOI | 10.1109/MWSCAS.2017.8052987 |
Citation Key | cornell_combinational_2017 |
- logical implications
- valid logic implications
- Trojan horses
- trojan horse detection
- security
- Resiliency
- resilience
- pubcrawl
- proof-of-concept demonstration
- potential benefit
- Payloads
- combinational circuits
- logic simulation
- Logic gates
- logic design
- invasive software
- Integrated circuit modeling
- Hardware
- cyber physical systems
- composability
- combinational hardware trojan detection