Visible to the public Stealthy Trojan Detection Based on Feature Analysis of Circuit Structure

TitleStealthy Trojan Detection Based on Feature Analysis of Circuit Structure
Publication TypeConference Paper
Year of Publication2019
AuthorsTan, Jiatong, Feng, Jianhua, Lyu, Yinxuan
Conference Name2019 IEEE International Conference on Electron Devices and Solid-State Circuits (EDSSC)
Keywordscircuit structure, compositionality, design methods, feature analysis, formal verification, hardware trojan, invasive software, ISCAS benchmarks, malicious HT, Predictive Metrics, pubcrawl, Resiliency, Scalability, scalable verification, scalable verification framework, static detection method, stealthy, stealthy Trojan detection, Stealthy Trojan node, trustiness verification methods
AbstractThe design methods and the detection methods for Hardware Trojan develop rapidly. Existing trustiness verification methods are effective to obviously malicious HT but no effect on Stealthy Trojan. Stealthy Trojan is an advanced attack form and hard to be detected. In this paper, we analyze the characteristic of stealthy Trojan and propose a static detection method based on feature analysis. The results on ISCAS benchmarks show that the proposed method can detect the Stealthy Trojan node and is convenient to be implanted into other scalable verification framework.
DOI10.1109/EDSSC.2019.8754248
Citation Keytan_stealthy_2019