首页> 外文会议>IEEE Asian Hardware-Oriented Security and Trust Symposium >Translating Circuit Behavior Manifestations of Hardware Trojans using Model Checkers into Run-time Trojan Detection Monitors
【24h】

Translating Circuit Behavior Manifestations of Hardware Trojans using Model Checkers into Run-time Trojan Detection Monitors

机译:用模型跳棋转换硬件特洛伊木马的电路行为表现在运行时木马检测监视器

获取原文

摘要

It is a consensus among the researchers, although not proven, that it is close to impossible to guarantee completely secure hardware design. Therefore, it is desired to have run-time hardware Trojan detection techniques. This paper is toward developing a framework of how to achieve run-time hardware Trojan detection units. Although it is difficult to predict the stage of circuit design at which hardware intruder would insert Trojan as well as the hardware Trojan detection methodology that should be applied, behavior patterns of certain design units in the hardware can indicate malicious activities in the design. We propose to translate such behavior patterns using formal verification approaches to establish run-time hardware Trojan detection technique leading which can improve the resiliency of hardware designs against hardware Trojan. We examine the possibility of malicious intrusions in both combinational and sequential circuits that may result in functional incorrectness, and applied our methodology in two example circuits.
机译:研究人员之间的共识是,虽然没有被证明,但它接近不可能保证完全安全的硬件设计。因此,希望具有运行时硬件特洛伊木马检测技术。本文旨在开发如何实现运行时硬件木马检测单元的框架。虽然很难预测电路设计的阶段,但是硬件入侵者将插入木马以及应应用的硬件特洛伊木马检测方法,硬件中某些设计单元的行为模式可以表明设计中的恶意活动。我们建议使用正式验证方法转换此类行为模式,以建立运行时硬件特洛伊木马检测技术,这可以提高硬件设计对硬件特洛伊木马的弹性。我们研究了组合和顺序电路中的恶意入侵的可能性,这可能导致功能不正确,并在两个示例电路中应用我们的方法。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号