Circuit enclaves susceptible to hardware Trojans insertion at gate-level designs

Seyed Mohammad Sebt, Ahmad Patooghy, Hakem Beitollahi, Michel Kinsy

Research output: Contribution to journalArticlepeer-review

13 Scopus citations

Abstract

A hardware Trojan (HT) is an extra circuitry inserted into a chip design with the malicious aim of functionality alteration, reliability degradation or secret information leakage. It is normally very hard to find HT activation signals since such signals are intended to activate upon occurring very rare conditions on specific nets of the infected circuit. A security engineer would have to search among thousands of gates and modules to make sure about the non-existence of design-time HTs in the circuit. The authors propose efficient net susceptibility metrics to significantly speedup functional-HT detection in gate-level digital designs. The proposed metrics perform a computationally low overhead analysis on the controllability and observability parameters of each net of the under HT-test circuit. Then, using a proposed net classifier method, a very low percentage of circuit nets is determined as HT trigger suspicious nets. To show practicality and detection accuracy of the proposed metrics, gate-level circuits of Trust-HUB benchmark suite are examined by the proposed metrics. Results confirm a 100% HT trigger detection with a low false positive as compared with previous metrics. More importantly, unlike previously proposed methods, the authors detection accuracy is totally independent of the switching probability of circuit inputs.

Original languageEnglish (US)
Pages (from-to)251-257
Number of pages7
JournalIET Computers and Digital Techniques
Volume12
Issue number6
DOIs
StatePublished - Nov 1 2018
Externally publishedYes

ASJC Scopus subject areas

  • Software
  • Hardware and Architecture
  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'Circuit enclaves susceptible to hardware Trojans insertion at gate-level designs'. Together they form a unique fingerprint.

Cite this