Skip to main content
Top

2018 | OriginalPaper | Chapter

8. Trusted Testing Techniques for Hardware Trojan Detection

Author : Hassan Salmani

Published in: Trusted Digital Circuits

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Some hardware Trojans are activated/triggered upon receiving a unique and unexpected vector made of signals of an original circuit or a sequence of such a vector. The fact makes test generation for hardware Trojan detection an extremely challenging task considering the complexity of modern designs and their verity of application. This chapter presents an overview on some of major efforts toward various test generation techniques for hardware Trojan detection after circuit manufacturing.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference S. Saha, R.S. Chakraborty, S.S. Nuthakki, Anshul, D. Mukhopadhyay, Improved test pattern generation for hardware Trojan detection using genetic algorithm and Boolean satisfiability. IACR Cryptology ePrint Archive 2015:1252 (2015) S. Saha, R.S. Chakraborty, S.S. Nuthakki, Anshul, D. Mukhopadhyay, Improved test pattern generation for hardware Trojan detection using genetic algorithm and Boolean satisfiability. IACR Cryptology ePrint Archive 2015:1252 (2015)
2.
go back to reference R.S. Chakraborty, F. Wolff, S. Paul, C. Papachristou, S. Bhunia, MERO: A Statistical Approach for Hardware Trojan Detection (Springer, Berlin, 2009), pp. 396–410 R.S. Chakraborty, F. Wolff, S. Paul, C. Papachristou, S. Bhunia, MERO: A Statistical Approach for Hardware Trojan Detection (Springer, Berlin, 2009), pp. 396–410
3.
go back to reference M. Banga, M.S. Hsiao, A novel sustained vector technique for the detection of hardware Trojans, in 2009 22nd International Conference on VLSI Design (2009), pp. 327–332 M. Banga, M.S. Hsiao, A novel sustained vector technique for the detection of hardware Trojans, in 2009 22nd International Conference on VLSI Design (2009), pp. 327–332
4.
go back to reference X. Mingfu, H. Aiqun, H. Yi, L. Guyue, Monte carlo based test pattern generation for hardware Trojan detection, in 2013 IEEE 11th International Conference on Dependable, Autonomic and Secure Computing (2013), pp. 131–136 X. Mingfu, H. Aiqun, H. Yi, L. Guyue, Monte carlo based test pattern generation for hardware Trojan detection, in 2013 IEEE 11th International Conference on Dependable, Autonomic and Secure Computing (2013), pp. 131–136
5.
go back to reference J. Cruz, F. Farahmandi, A. Ahmed, P. Mishra, Hardware Trojan detection using ATPG and model checking, in International Conference on VLSI Design (2018), pp. 1–6 J. Cruz, F. Farahmandi, A. Ahmed, P. Mishra, Hardware Trojan detection using ATPG and model checking, in International Conference on VLSI Design (2018), pp. 1–6
6.
go back to reference Y. Huang, P, Mishra, Test generation for detection of malicious parametric variations, in Hardware IP Security and Trust (Springer, Cham, 2017) Y. Huang, P, Mishra, Test generation for detection of malicious parametric variations, in Hardware IP Security and Trust (Springer, Cham, 2017)
7.
go back to reference H. Hajimiri, K. Rahmani, P. Mishra, Efficient peak power estimation using probabilistic cost-benefit analysis, in 2015 28th International Conference on VLSI Design (2015), pp. 369–374 H. Hajimiri, K. Rahmani, P. Mishra, Efficient peak power estimation using probabilistic cost-benefit analysis, in 2015 28th International Conference on VLSI Design (2015), pp. 369–374
8.
go back to reference K. Ganesan, L.K. John, Maximum multicore power (MAMPO)—an automatic multithreaded synthetic power virus generation framework for multicore systems, in 2011 International Conference for High Performance Computing, Networking, Storage and Analysis (SC) (2011), pp. 1–12 K. Ganesan, L.K. John, Maximum multicore power (MAMPO)—an automatic multithreaded synthetic power virus generation framework for multicore systems, in 2011 International Conference for High Performance Computing, Networking, Storage and Analysis (SC) (2011), pp. 1–12
Metadata
Title
Trusted Testing Techniques for Hardware Trojan Detection
Author
Hassan Salmani
Copyright Year
2018
DOI
https://doi.org/10.1007/978-3-319-79081-7_8