Hardware Trojan Detection through Information Flow Security Verification

03/12/2018
by   Adib Nahiyan, et al.
0

Semiconductor design houses are increasingly becoming dependent on third party vendors to procure intellectual property (IP) and meet time-to-market constraints. However, these third party IPs cannot be trusted as hardware Trojans can be maliciously inserted into them by untrusted vendors. While different approaches have been proposed to detect Trojans in third party IPs, their limitations have not been extensively studied. In this paper, we analyze the limitations of the state-of-the-art Trojan detection techniques and demonstrate with experimental results how to defeat these detection mechanisms. We then propose a Trojan detection framework based on information flow security (IFS) verification. Our framework detects violation of IFS policies caused by Trojans without the need of white-box knowledge of the IP. We experimentally validate the efficacy of our proposed technique by accurately identifying Trojans in the trust-hub benchmarks. We also demonstrate that our technique does not share the limitations of the previously proposed Trojan detection techniques.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
11/29/2021

Third-Party Hardware IP Assurance against Trojans through Supervised Learning and Post-processing

System-on-chip (SoC) developers increasingly rely on pre-verified hardwa...
research
01/04/2022

Reusing Verification Assertions as Security Checkers for Hardware Trojan Detection

Globalization in the semiconductor industry enables fabless design house...
research
02/17/2023

DETER: Design for Trust utilizing Rareness Reduction

Increasing design complexity and reduced time-to-market have motivated m...
research
11/03/2017

Dynamic FPGA Detection and Protection of Hardware Trojan: A Comparative Analysis

Hardware Trojan detection and protection is becoming more crucial as mor...
research
09/16/2023

Improving Section 230, Preserving Democracy and Protecting Free Speech

This article proposes a framework for content moderation based on a dece...
research
11/06/2019

Polymorphic Encryption and Pseudonymisation of IP Network Flows

We describe a system, PEP3, for storage and retrieval of IP flow informa...
research
08/05/2023

DiSPEL: Distributed Security Policy Enforcement for Bus-based SoC

The current zero trust model adopted in System-on-Chip (SoC) design is v...

Please sign up or login with your details

Forgot password? Click here to reset