首页> 外文会议>2018 IEEE International Test Conference in Asia >Small Trojan Testing Using Bounded Model Checking
【24h】

Small Trojan Testing Using Bounded Model Checking

机译:使用有界模型检查进行小木马测试

获取原文
获取原文并翻译 | 示例

摘要

With the widely using of VLSI circuits, their security issue has been a critical factor to the security of the modern system. In this paper, we propose a testing method using Bounded Model Checking (BMC) to test the small Trojan that is injected by slightly modifying the original design. First, we implement physical inspection on the training chip set that has the same function but from different sources, and extract suspicious circuit pairs by pairwise comparison on the chips. Second, we use BMC to detect the inconsistent functions on the suspicious circuit pairs. Third, we collects these inconsistent functions as well as their corresponding input sequences into a vulnerability scanner library, and test the other chips using that library. Experimental results show the proposed method can detect the small Trojan in sequential circuits with large sequential depth using an optimized computing time. Furthermore, the method can accurately distinguish small Trojans from circuit optimizations in logic synthesis.
机译:随着VLSI电路的广泛使用,其安全性问题已成为现代系统安全性的关键因素。在本文中,我们提出了一种使用边界模型检查(BMC)的测试方法,通过对原始设计进行一些修改来测试注入的小型木马。首先,我们对功能相同但来源不同的训练芯片组进行物理检查,并通过成对比较在芯片上提取可疑电路对。其次,我们使用BMC来检测可疑电路对上的不一致功能。第三,我们将这些不一致的功能及其相应的输入序列收集到漏洞扫描程序库中,并使用该库测试其他芯片。实验结果表明,该方法可以利用优化的计算时间,在较大深度的时序电路中检测出小木马。此外,该方法可以在逻辑综合中准确地将小型木马与电路优化区分开。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号