Title | Stealthy Trojan Detection Based on Feature Analysis of Circuit Structure |
Publication Type | Conference Paper |
Year of Publication | 2019 |
Authors | Tan, Jiatong, Feng, Jianhua, Lyu, Yinxuan |
Conference Name | 2019 IEEE International Conference on Electron Devices and Solid-State Circuits (EDSSC) |
Keywords | circuit structure, compositionality, design methods, feature analysis, formal verification, hardware trojan, invasive software, ISCAS benchmarks, malicious HT, Predictive Metrics, pubcrawl, Resiliency, Scalability, scalable verification, scalable verification framework, static detection method, stealthy, stealthy Trojan detection, Stealthy Trojan node, trustiness verification methods |
Abstract | The design methods and the detection methods for Hardware Trojan develop rapidly. Existing trustiness verification methods are effective to obviously malicious HT but no effect on Stealthy Trojan. Stealthy Trojan is an advanced attack form and hard to be detected. In this paper, we analyze the characteristic of stealthy Trojan and propose a static detection method based on feature analysis. The results on ISCAS benchmarks show that the proposed method can detect the Stealthy Trojan node and is convenient to be implanted into other scalable verification framework. |
DOI | 10.1109/EDSSC.2019.8754248 |
Citation Key | tan_stealthy_2019 |