LAOCOÖN: A Run-Time Monitoring and Verification Approach for Hardware Trojan Detection
Title | LAOCOÖN: A Run-Time Monitoring and Verification Approach for Hardware Trojan Detection |
Publication Type | Conference Paper |
Year of Publication | 2019 |
Authors | Danger, Jean-Luc, Fribourg, Laurent, Kühne, Ulrich, Naceur, Maha |
Conference Name | 2019 22nd Euromicro Conference on Digital System Design (DSD) |
ISBN Number | 978-1-7281-2862-7 |
Keywords | active fault attacks, Automata, Circuit faults, cyber physical systems, dedicated monitoring circuits, electronic systems, Fault Attacks, formal verification, formal verification techniques, generic attackers, Hardware, hardware security, hardware Trojan detection, hardware Trojan horses, Integrated circuit modeling, invasive software, LAOCOON, malicious inclusions, Monitoring, pubcrawl, resilience, Resiliency, run-time monitoring, run-time verification, Safety, security, sensitive information, supply chain security, temporal properties, trojan horse detection, Trojan horses, verification rules |
Abstract | Hardware Trojan Horses and active fault attacks are a threat to the safety and security of electronic systems. By such manipulations, an attacker can extract sensitive information or disturb the functionality of a device. Therefore, several protections against malicious inclusions have been devised in recent years. A prominent technique to detect abnormal behavior in the field is run-time verification. It relies on dedicated monitoring circuits and on verification rules generated from a set of temporal properties. An important question when dealing with such protections is the effectiveness of the protection against unknown attacks. In this paper, we present a methodology based on automatic generation of monitoring and formal verification techniques that can be used to validate and analyze the quality of a set of temporal properties when used as protection against generic attackers of variable strengths. |
URL | https://ieeexplore.ieee.org/document/8875250 |
DOI | 10.1109/DSD.2019.00047 |
Citation Key | danger_laocoon_2019 |
- LAOCOON
- verification rules
- Trojan horses
- trojan horse detection
- temporal properties
- supply chain security
- sensitive information
- security
- Safety
- run-time verification
- run-time monitoring
- Resiliency
- resilience
- pubcrawl
- Monitoring
- malicious inclusions
- active fault attacks
- invasive software
- Integrated circuit modeling
- hardware Trojan horses
- hardware Trojan detection
- Hardware Security
- Hardware
- generic attackers
- formal verification techniques
- formal verification
- Fault Attacks
- electronic systems
- dedicated monitoring circuits
- cyber physical systems
- Circuit faults
- automata