Analytical Estimation and Localization of Hardware Trojan Vulnerability in RTL Designs

03/29/2020
by   Love Kumar Sah, et al.
0

Offshoring the proprietary Intellectual property (IP) has recently increased the threat of malicious logic insertion in the form of Hardware Trojan (HT). A potential and stealthy HT is triggered with nets that switch rarely during regular circuit operation. Detection of HT in the host design requires exhaustive simulation to activate the HT during pre- and postsilicon. Although the nets with variable switching probability less than a threshold are primarily chosen as a good candidate for Trojan triggering, there is no systematic fine-grained approach for earlier detection of rare nets from word-level measures of input signals. In this paper, we propose a high-level technique to estimate the nets with the rare activity of arithmetic modules from word-level information. Specifically, for a given module, we use the knowledge of internal construction of the architecture to detect "low activity" and "local regions" without resorting to expensive RTL and other low-level simulations. The presented heuristic method abstracts away from the low-level details of design and describes the rare activity of bits (modules) in a word (architecture) as a function of signal statistics. The resulting quick estimates of nets in rare regions allows a designer to develop a compact test generation algorithm without the knowledge of the bit-level activity. We determine the effect of different positions of the breakpoint in the input signal to calculate the accuracy of the approach. We conduct a set of experiments on six adder architectures and four multiplier architectures. The average error to calculate the rare nets between RTL simulation and estimated values are below 2

READ FULL TEXT

page 2

page 6

research
12/21/2019

Socio-network Analysis of RTL Designs for Hardware Trojan Localization

The recent surge in hardware security is significant due to offshoring t...
research
04/26/2023

Multi-criteria Hardware Trojan Detection: A Reinforcement Learning Approach

Hardware Trojans (HTs) are undesired design or manufacturing modificatio...
research
05/13/2021

High-level Intellectual Property Obfuscation via Decoy Constants

This paper presents a high-level circuit obfuscation technique to preven...
research
11/28/2022

Efficient Mirror Detection via Multi-level Heterogeneous Learning

We present HetNet (Multi-level Heterogeneous Network), a highly efficien...
research
11/29/2021

Third-Party Hardware IP Assurance against Trojans through Supervised Learning and Post-processing

System-on-chip (SoC) developers increasingly rely on pre-verified hardwa...
research
08/16/2021

TL-SDD: A Transfer Learning-Based Method for Surface Defect Detection with Few Samples

Surface defect detection plays an increasingly important role in manufac...
research
02/17/2023

DETER: Design for Trust utilizing Rareness Reduction

Increasing design complexity and reduced time-to-market have motivated m...

Please sign up or login with your details

Forgot password? Click here to reset