首页> 外文会议>Asia and South Pacific Design Automation Conference >Detecting hardware Trojans in unspecified functionality through solving satisfiability problems
【24h】

Detecting hardware Trojans in unspecified functionality through solving satisfiability problems

机译:通过解决可满足性问题来检测未指定功能的硬件木马

获取原文

摘要

For modern complex designs it is impossible to fully specify design behavior, and only feasible to verify functionally meaningful scenarios. Hardware Trojans modifying only unspecified functionality are not possible to detect using existing verification methodologies and Trojan detection strategies. We propose a detection methodology for these Trojans by 1) precisely defining “suspicious” unspecified functionality in terms of information leakage, and 2) formulating detection as a satisfiability problem that can take advantage of the recent advances in both boolean and satisfiability modulo theory (SMT) solvers. The formulated detection procedure can be applied to a gate-level design using commercial equivalence checking tools, or directly to the Verilog/VHDL code by reasoning about the satisfiability of SMT expressions built from traversing the data-flow graph. We demonstrate the effectiveness of our approach on an adder coprocessor and a UART communication controller infected with Trojans which process information leaked from the on-chip bus during idle cycles using signals with only partially specified behavior.
机译:对于现代复杂的设计,不可能完全指定设计行为,只有在验证功能上有意义的方案时才可行。使用现有验证方法和特洛伊木马检测策略无法检测仅修改未指定功能的硬件木马。我们为这些木马提供一种检测方法,其方法是:1)根据信息泄漏精确定义“可疑”未指定的功能,以及2)将检测公式化为可满足性问题,可以利用布尔和可满足性模理论(SMT)的最新进展)求解器。通过使用遍历数据流图构建的SMT表达式的合理性,可以使用商业等效检查工具将制定的检测过程应用于门级设计,或直接应用于Verilog / VHDL代码。我们展示了我们的方法在感染了特洛伊木马的加法器协处理器和UART通信控制器上的有效性,该木马处理的闲置周期内仅使用部分指定行为的信号从片上总线泄漏的信息。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号