首页> 外文会议>IEEE International Verification and Security Workshop >Using Outliers to Detect Stealthy Hardware Trojan Triggering?
【24h】

Using Outliers to Detect Stealthy Hardware Trojan Triggering?

机译:使用异常值来检测隐身的硬件特洛伊木马触发?

获取原文

摘要

Hardware Trojans (HTs) are malicious alterations to a circuit introduced at design or manufacturing phases by an adversary. Due to their diversity, detecting and/or locating them are challenging tasks. Among the different kinds of detection methods, methods based on logic testing aim to reveal the presence of HTs thanks to their logical activation and observation through primary outputs. However, HTs are stealthy in nature, i.e. mostly inactive unless triggered by a very rare condition. Furthermore, test patterns must be developed without any knowledge on the location and function implemented by the HT. A procedure has recently been proposed to identify in a netlist suspicious signals that may be part of a HT introduced at design stage: these so-called "outliers" present an activity poorly correlated with other signals. In this paper, we undertake to use outliers in order to detect a HT introduced at manufacturing stage. We propose a test pattern generation technique based on the exploration of outliers. Our assumption is that such signals may be selected by an attacker in order to trigger his/her HT.
机译:硬件特洛伊木马(HTS)是由对手在设计或制造阶段引入的电路的恶意修改。由于它们的多样性,检测和/或定位它们是具有挑战性的任务。在不同种类的检测方法中,基于逻辑测试的方法旨在揭示HTS的存在,由于它们通过主要输出的逻辑激活和观察。然而,HTS本质上是隐身的,即,除非被一个非常罕见的条件引发,否则主要是不活跃的。此外,必须在没有任何关于HT实现的位置和功能的情况下开发测试模式。最近提出了一个程序,以识别可以成为在设计阶段引入的HT的一部分的网发士的可疑信号:这些所谓的“异常值”呈现与其他信号相关的活动。在本文中,我们承诺使用异常值来检测在制造阶段引入的HT。我们提出了一种基于异常值探索的测试模式生成技术。我们的假设是可以由攻击者选择这种信号,以触发他/她的HT。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号