Skip to main content

2018 | OriginalPaper | Buchkapitel

8. Trusted Testing Techniques for Hardware Trojan Detection

verfasst von : Hassan Salmani

Erschienen in: Trusted Digital Circuits

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Some hardware Trojans are activated/triggered upon receiving a unique and unexpected vector made of signals of an original circuit or a sequence of such a vector. The fact makes test generation for hardware Trojan detection an extremely challenging task considering the complexity of modern designs and their verity of application. This chapter presents an overview on some of major efforts toward various test generation techniques for hardware Trojan detection after circuit manufacturing.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat S. Saha, R.S. Chakraborty, S.S. Nuthakki, Anshul, D. Mukhopadhyay, Improved test pattern generation for hardware Trojan detection using genetic algorithm and Boolean satisfiability. IACR Cryptology ePrint Archive 2015:1252 (2015) S. Saha, R.S. Chakraborty, S.S. Nuthakki, Anshul, D. Mukhopadhyay, Improved test pattern generation for hardware Trojan detection using genetic algorithm and Boolean satisfiability. IACR Cryptology ePrint Archive 2015:1252 (2015)
2.
Zurück zum Zitat R.S. Chakraborty, F. Wolff, S. Paul, C. Papachristou, S. Bhunia, MERO: A Statistical Approach for Hardware Trojan Detection (Springer, Berlin, 2009), pp. 396–410 R.S. Chakraborty, F. Wolff, S. Paul, C. Papachristou, S. Bhunia, MERO: A Statistical Approach for Hardware Trojan Detection (Springer, Berlin, 2009), pp. 396–410
3.
Zurück zum Zitat M. Banga, M.S. Hsiao, A novel sustained vector technique for the detection of hardware Trojans, in 2009 22nd International Conference on VLSI Design (2009), pp. 327–332 M. Banga, M.S. Hsiao, A novel sustained vector technique for the detection of hardware Trojans, in 2009 22nd International Conference on VLSI Design (2009), pp. 327–332
4.
Zurück zum Zitat X. Mingfu, H. Aiqun, H. Yi, L. Guyue, Monte carlo based test pattern generation for hardware Trojan detection, in 2013 IEEE 11th International Conference on Dependable, Autonomic and Secure Computing (2013), pp. 131–136 X. Mingfu, H. Aiqun, H. Yi, L. Guyue, Monte carlo based test pattern generation for hardware Trojan detection, in 2013 IEEE 11th International Conference on Dependable, Autonomic and Secure Computing (2013), pp. 131–136
5.
Zurück zum Zitat J. Cruz, F. Farahmandi, A. Ahmed, P. Mishra, Hardware Trojan detection using ATPG and model checking, in International Conference on VLSI Design (2018), pp. 1–6 J. Cruz, F. Farahmandi, A. Ahmed, P. Mishra, Hardware Trojan detection using ATPG and model checking, in International Conference on VLSI Design (2018), pp. 1–6
6.
Zurück zum Zitat Y. Huang, P, Mishra, Test generation for detection of malicious parametric variations, in Hardware IP Security and Trust (Springer, Cham, 2017) Y. Huang, P, Mishra, Test generation for detection of malicious parametric variations, in Hardware IP Security and Trust (Springer, Cham, 2017)
7.
Zurück zum Zitat H. Hajimiri, K. Rahmani, P. Mishra, Efficient peak power estimation using probabilistic cost-benefit analysis, in 2015 28th International Conference on VLSI Design (2015), pp. 369–374 H. Hajimiri, K. Rahmani, P. Mishra, Efficient peak power estimation using probabilistic cost-benefit analysis, in 2015 28th International Conference on VLSI Design (2015), pp. 369–374
8.
Zurück zum Zitat K. Ganesan, L.K. John, Maximum multicore power (MAMPO)—an automatic multithreaded synthetic power virus generation framework for multicore systems, in 2011 International Conference for High Performance Computing, Networking, Storage and Analysis (SC) (2011), pp. 1–12 K. Ganesan, L.K. John, Maximum multicore power (MAMPO)—an automatic multithreaded synthetic power virus generation framework for multicore systems, in 2011 International Conference for High Performance Computing, Networking, Storage and Analysis (SC) (2011), pp. 1–12
Metadaten
Titel
Trusted Testing Techniques for Hardware Trojan Detection
verfasst von
Hassan Salmani
Copyright-Jahr
2018
DOI
https://doi.org/10.1007/978-3-319-79081-7_8

Neuer Inhalt