Skip to main content
Top
Published in: Journal of Electronic Testing 4/2018

05-07-2018

Hardware Trojan Detection Using an Advised Genetic Algorithm Based Logic Testing

Authors: M. A. Nourian, M. Fazeli, D. Hely

Published in: Journal of Electronic Testing | Issue 4/2018

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Today, outsourced manufacturing of integrated circuit designs are prone to a range of malicious modifications of the circuitry called Hardware Trojans. HTs can alter the functionality of a circuit, leak secret information and initiate other possible malicious actions. HTs are activated in a very rare condition known by an intruder. Therefore, a group of HT detection methods tries to activate the HT circuitry by crafting test vectors. In this paper, we propose a logic testing based HT detection method using an advised genetic algorithm which creates effective test vectors, the so-called TRIAGE (hardware TR ojan detectI on using an A dvised G enetic algorithm based logic tE sting). The key contribution of this paper is to present a proper fitness function for the genetic algorithm providing better evaluation of the test vectors. The controllability, observability and transition probability factors of rare nodes have been considered in the fitness function. Simulation results indicate 80% reduction in generation time for test sets (on average) as compared to the previous work. On the other hand, reduced generation time for test vectors has been associated with an increase in trigger coverage. The coverage of the TRIAGE method for very hard to trigger Trojans increases by about 23% due to high efficiency of the proposed fitness function for the genetic algorithm.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Show more products
Literature
1.
go back to reference Aarestad J, Acharyya D, Rad R, Plusquellic J (2010) Detecting trojans through leakage current analysis using multiple supply pad IDDQs. IEEE Trans Inf Forens Secur 5(4):893–904CrossRef Aarestad J, Acharyya D, Rad R, Plusquellic J (2010) Detecting trojans through leakage current analysis using multiple supply pad IDDQs. IEEE Trans Inf Forens Secur 5(4):893–904CrossRef
2.
go back to reference Abdellatif KM, Cornesse C, Fournier J, Robisson B (2016) New partitioning approach for hardware Trojan detection using side-channel measurements. In: Bonato V, Bouganis C, Gorgon M (eds) Applied reconfigurable computing, ser. lecture notes in computer science, vol 9625. Springer International Publishing, Cham, pp 171–182. [Online]. Available: http://dl.acm.org/citation.cfm?id=2966541 Abdellatif KM, Cornesse C, Fournier J, Robisson B (2016) New partitioning approach for hardware Trojan detection using side-channel measurements. In: Bonato V, Bouganis C, Gorgon M (eds) Applied reconfigurable computing, ser. lecture notes in computer science, vol 9625. Springer International Publishing, Cham, pp 171–182. [Online]. Available: http://​dl.​acm.​org/​citation.​cfm?​id=​2966541
3.
go back to reference Ba PS, Dupuis S, Flottes ML, Di Natale G, Rouzeyre B (2016) Using outliers to detect stealthy hardware trojan triggering? In: 2016 1st IEEE International verification and security workshop, IVSW 2016, pp 64–69 Ba PS, Dupuis S, Flottes ML, Di Natale G, Rouzeyre B (2016) Using outliers to detect stealthy hardware trojan triggering? In: 2016 1st IEEE International verification and security workshop, IVSW 2016, pp 64–69
5.
go back to reference Bhunia S, Hsiao MS, Banga M, Narasimhan S (2014) Hardware trojan attacks: threat analysis and countermeasures. Proc IEEE 102(8):1229–1247CrossRef Bhunia S, Hsiao MS, Banga M, Narasimhan S (2014) Hardware trojan attacks: threat analysis and countermeasures. Proc IEEE 102(8):1229–1247CrossRef
6.
go back to reference Chakraborty S, Bhunia RS (2009) Security against hardware Trojan through a novel application of design obfuscation. In: IEEE/ACM International Conference on computer-aided design - digest of technical papers, 2009. ICCAD 2009, pp 113–116 Chakraborty S, Bhunia RS (2009) Security against hardware Trojan through a novel application of design obfuscation. In: IEEE/ACM International Conference on computer-aided design - digest of technical papers, 2009. ICCAD 2009, pp 113–116
7.
go back to reference Chakraborty RS, Bhunia S (2009) HARPOON: an obfuscation-based SoC design methodology for hardware protection. IEEE Trans Comput-Aided Des Integr Circ Syst 28(10):1493–1502CrossRef Chakraborty RS, Bhunia S (2009) HARPOON: an obfuscation-based SoC design methodology for hardware protection. IEEE Trans Comput-Aided Des Integr Circ Syst 28(10):1493–1502CrossRef
8.
go back to reference Chakraborty RS, Wolff F, Paul S, Papachristou C, Bhunia S (2009) MERO: a statistical approach for hardware Trojan detection. Lecture notes in computer science (including subseries lecture notes in artificial intelligence and lecture notes in bioinformatics), vol 5747 LNCS, pp 396–410 Chakraborty RS, Wolff F, Paul S, Papachristou C, Bhunia S (2009) MERO: a statistical approach for hardware Trojan detection. Lecture notes in computer science (including subseries lecture notes in artificial intelligence and lecture notes in bioinformatics), vol 5747 LNCS, pp 396–410
9.
11.
go back to reference Hermawanto D (2013) Genetic algorithm for solving simple mathematical equality problem. Indonesian Institute of Sciences (LIPI). [Online]. Available: arXiv:1308.4675 Hermawanto D (2013) Genetic algorithm for solving simple mathematical equality problem. Indonesian Institute of Sciences (LIPI). [Online]. Available: arXiv:1308.​4675
12.
go back to reference Keshavarzi A, Roy K, Hawkins CF, De V (2003) Multiple-parameter CMOS IC testing with increased sensitivity for I DDQ. IEEE Trans Very Large Scale Integrat (VLSI) Syst 11(5): 863–870CrossRef Keshavarzi A, Roy K, Hawkins CF, De V (2003) Multiple-parameter CMOS IC testing with increased sensitivity for I DDQ. IEEE Trans Very Large Scale Integrat (VLSI) Syst 11(5): 863–870CrossRef
13.
14.
go back to reference Liu Y, Jin Y, Nosratinia A, Makris Y (2017) Silicon demonstration of hardware trojan design and detection in wireless cryptographic ICs. IEEE Trans Very Large Scale Integrat (VLSI) Syst 25(4):1506–1519CrossRef Liu Y, Jin Y, Nosratinia A, Makris Y (2017) Silicon demonstration of hardware trojan design and detection in wireless cryptographic ICs. IEEE Trans Very Large Scale Integrat (VLSI) Syst 25(4):1506–1519CrossRef
15.
go back to reference Mukhopadhyay D, Chakraborty RS (2015) Hardware security design, threats, and safeguards. CRC Press Mukhopadhyay D, Chakraborty RS (2015) Hardware security design, threats, and safeguards. CRC Press
16.
go back to reference Narasimhan S, Du D, Chakraborty RS, Paul S, Wolff FG, Papachristou CA, Roy K, Bhunia S (2013) Hardware trojan detection by multiple-parameter side-channel analysis. IEEE Trans Comput 62 (11):2183–2195MathSciNetCrossRefMATH Narasimhan S, Du D, Chakraborty RS, Paul S, Wolff FG, Papachristou CA, Roy K, Bhunia S (2013) Hardware trojan detection by multiple-parameter side-channel analysis. IEEE Trans Comput 62 (11):2183–2195MathSciNetCrossRefMATH
17.
go back to reference Rad R, Plusquellic J, Tehranipoor M (2010) A sensitivity analysis of power signal methods for detecting hardware trojans under real process and environmental conditions. IEEE Trans Very Large Scale Integrat (VLSI) Syst 18(12):1735–1744CrossRef Rad R, Plusquellic J, Tehranipoor M (2010) A sensitivity analysis of power signal methods for detecting hardware trojans under real process and environmental conditions. IEEE Trans Very Large Scale Integrat (VLSI) Syst 18(12):1735–1744CrossRef
18.
go back to reference Rai D, Lach J (2009) Performance of delay-based trojan detection techniques under parameter variations. In: 2009 IEEE International workshop on hardware-oriented security and trust, HOST 2009, pp 58–65 Rai D, Lach J (2009) Performance of delay-based trojan detection techniques under parameter variations. In: 2009 IEEE International workshop on hardware-oriented security and trust, HOST 2009, pp 58–65
20.
go back to reference Rajendran J, Pino Y, Sinanoglu O, Karri R (2012) Security analysis of logic obfuscation. In: 2012 Design automation conference (DAC), pp 83–89 Rajendran J, Pino Y, Sinanoglu O, Karri R (2012) Security analysis of logic obfuscation. In: 2012 Design automation conference (DAC), pp 83–89
21.
go back to reference Rajendran J, Zhang H, Zhang C, Rose GS, Pino Y, Sinanoglu O, Karri R (2015) Fault analysis-based logic encryption. IEEE Trans Comput 64(2):410–424MathSciNetCrossRefMATH Rajendran J, Zhang H, Zhang C, Rose GS, Pino Y, Sinanoglu O, Karri R (2015) Fault analysis-based logic encryption. IEEE Trans Comput 64(2):410–424MathSciNetCrossRefMATH
22.
go back to reference Saha S, Chakraborty RS, Nuthakki S, Anshul S, Mukhopadhyay D (2015) Improved test pattern generation for hardware Trojan detection using genetic algorithm and Boolean satisfiability. In: Güneysu T, Handschuh H (eds) Cryptographic hardware and embedded systems – CHES 2015, ser. Lecture notes in computer science, vol 9293. Springer, Berlin, pp 577–596. [Online]. Available: http://link.springer.com/10.1007/978-3-662-48324-4 Saha S, Chakraborty RS, Nuthakki S, Anshul S, Mukhopadhyay D (2015) Improved test pattern generation for hardware Trojan detection using genetic algorithm and Boolean satisfiability. In: Güneysu T, Handschuh H (eds) Cryptographic hardware and embedded systems – CHES 2015, ser. Lecture notes in computer science, vol 9293. Springer, Berlin, pp 577–596. [Online]. Available: http://​link.​springer.​com/​10.​1007/​978-3-662-48324-4
23.
go back to reference Salmani H, Tehranipoor M, Plusquellic J (2012) A novel technique for improving hardware trojan detection and reducing trojan activation time. IEEE Trans Very Large Scale Integration (VLSI) Syst 20(1):112–125CrossRef Salmani H, Tehranipoor M, Plusquellic J (2012) A novel technique for improving hardware trojan detection and reducing trojan activation time. IEEE Trans Very Large Scale Integration (VLSI) Syst 20(1):112–125CrossRef
24.
go back to reference Tehranipoor M, Koushanfar F (2010) A survey of hardware trojan taxonomy and detection,10–25 Tehranipoor M, Koushanfar F (2010) A survey of hardware trojan taxonomy and detection,10–25
25.
go back to reference Tehranipoor M, Wang C (2011) Introduction to hardware security and trust. Springer Science & Business Media Tehranipoor M, Wang C (2011) Introduction to hardware security and trust. Springer Science & Business Media
26.
go back to reference Waksman A, Suozzo M, Sethumadhavan S (2013) FANCI : identification of stealthy malicious logic using boolean functional analysis. Ccs 2013(c):697–708 Waksman A, Suozzo M, Sethumadhavan S (2013) FANCI : identification of stealthy malicious logic using boolean functional analysis. Ccs 2013(c):697–708
27.
go back to reference Wolff F, Papachristou C, Bhunia S, Chakraborty RS (2008) Towards Trojan-free trusted ICs: problem analysis and detection scheme. In: Proceedings -design, automation and test in Europe, DATE, pp 1362–1365 Wolff F, Papachristou C, Bhunia S, Chakraborty RS (2008) Towards Trojan-free trusted ICs: problem analysis and detection scheme. In: Proceedings -design, automation and test in Europe, DATE, pp 1362–1365
28.
go back to reference Zhang X, Tehranipoor M (2011) Case study: detecting hardware Trojans in third-party digital IP cores. In: 2011 IEEE International symposium on hardware-oriented security and trust, HOST 2011, pp 67–70 Zhang X, Tehranipoor M (2011) Case study: detecting hardware Trojans in third-party digital IP cores. In: 2011 IEEE International symposium on hardware-oriented security and trust, HOST 2011, pp 67–70
29.
go back to reference Zhang J, Yuan F, Wei L, Liu Y, Xu Q (2015) VeriTrust: verification for hardware trust. IEEE Trans Comput-Aided Des Integrat Circ Syst 34(7):1148–1161CrossRef Zhang J, Yuan F, Wei L, Liu Y, Xu Q (2015) VeriTrust: verification for hardware trust. IEEE Trans Comput-Aided Des Integrat Circ Syst 34(7):1148–1161CrossRef
30.
go back to reference Zhao H, Kwiat K, Kamhoua C, Rodriguez M (2015) Applying chaos theory for runtime hardware Trojan detection. In: 2015 IEEE Symposium on computational intelligence for security and defense applications CISDA 2015 - proceedings, pp 156–161 Zhao H, Kwiat K, Kamhoua C, Rodriguez M (2015) Applying chaos theory for runtime hardware Trojan detection. In: 2015 IEEE Symposium on computational intelligence for security and defense applications CISDA 2015 - proceedings, pp 156–161
Metadata
Title
Hardware Trojan Detection Using an Advised Genetic Algorithm Based Logic Testing
Authors
M. A. Nourian
M. Fazeli
D. Hely
Publication date
05-07-2018
Publisher
Springer US
Published in
Journal of Electronic Testing / Issue 4/2018
Print ISSN: 0923-8174
Electronic ISSN: 1573-0727
DOI
https://doi.org/10.1007/s10836-018-5739-4

Other articles of this Issue 4/2018

Journal of Electronic Testing 4/2018 Go to the issue