Publication | Open Access
A Hardware Trojan Detection Method Based on Structural Features of Trojan and Host Circuits
25
Citations
23
References
2019
Year
Hardware SecurityStructural FeaturesHost CircuitsHardware TrojanEngineeringInformation SecurityComputer EngineeringComputer ArchitectureInformation ForensicsComputer ScienceHardware Security SolutionSide-channel AttackFault AttackHardware SystemsCombined Structural FeaturesFormal Verification
Modern IC designs often involve outsourced IP cores. It is convinced that there are opportunities in which the IP cores contain malicious logic, namely hardware Trojan (HT), which raises serious concerns about the trustworthiness of ICs used in mission-critical applications. This paper proposes an HT detection method by analyzing the combined structural features of HTs and host circuits. The structural features of combinational and sequential logic HTs are extracted and form an HT feature database. An efficient quantization approach on feature matching is proposed to search the features from circuit designs. The experiments conducted on TrustHub benchmarks show that the proposed method can successfully detect all stealth Trojans with runtime within 72 s on a platform with an AMD 2.00-GHz CPU with 4-GB RAM and a low false positive rate compared with the existing methods.
| Year | Citations | |
|---|---|---|
Page 1
Page 1