Socio-network Analysis of RTL Designs for Hardware Trojan Localization

12/21/2019
by   Farha Islam Mime, et al.
0

The recent surge in hardware security is significant due to offshoring the proprietary Intellectual property (IP). One distinct dimension of the disruptive threat is malicious logic insertion, also known as Hardware Trojan (HT). HT subverts the normal operations of a device stealthily. The diversity in HTs activation mechanisms and their location in design brings no catch-all detection techniques. In this paper, we propose to leverage principle features of social network analysis to security analysis of Register Transfer Level (RTL) designs against HT. The approach is based on investigating design properties, and it extends the current detection techniques. In particular, we perform both node- and graph-level analysis to determine the direct and indirect interactions between nets in a design. This technique helps not only in finding vulnerable nets that can act as HT triggering signals but also their interactions to influence a particular net to act as HT payload signal. We experiment the technique on 420 combinational HT instances, and on average, we can detect both triggering and payload signals with accuracy up to 97.37

READ FULL TEXT

page 1

page 2

page 3

page 4

research
03/29/2020

Analytical Estimation and Localization of Hardware Trojan Vulnerability in RTL Designs

Offshoring the proprietary Intellectual property (IP) has recently incre...
research
07/19/2021

GNN4IP: Graph Neural Network for Hardware Intellectual Property Piracy Detection

Aggressive time-to-market constraints and enormous hardware design and f...
research
11/29/2021

Third-Party Hardware IP Assurance against Trojans through Supervised Learning and Post-processing

System-on-chip (SoC) developers increasingly rely on pre-verified hardwa...
research
09/22/2019

Side-Channel Hardware Trojan for Provably-Secure SCA-Protected Implementations

Hardware Trojans have drawn the attention of academia, industry and gove...
research
07/05/2023

A Survey Report on Hardware Trojan Detection by Multiple-Parameter Side-Channel Analysis

A major security threat to an integrated circuit (IC) design is the Hard...
research
03/04/2022

Contrastive Graph Convolutional Networks for Hardware Trojan Detection in Third Party IP Cores

The availability of wide-ranging third-party intellectual property (3PIP...
research
06/10/2020

Evaluating the Exploitability of Implicit Interactions in Distributed Systems

Implicit interactions refer to those interactions among the components o...

Please sign up or login with your details

Forgot password? Click here to reset