Academia.eduAcademia.edu

Hardware Trojan Detection

description23 papers
group2 followers
lightbulbAbout this topic
Hardware Trojan Detection refers to the methodologies and techniques employed to identify malicious modifications or alterations in hardware components, which can compromise system integrity, security, and functionality. This field encompasses various approaches, including testing, verification, and analysis of hardware designs to ensure their authenticity and reliability.
lightbulbAbout this topic
Hardware Trojan Detection refers to the methodologies and techniques employed to identify malicious modifications or alterations in hardware components, which can compromise system integrity, security, and functionality. This field encompasses various approaches, including testing, verification, and analysis of hardware designs to ensure their authenticity and reliability.

Key research themes

1. How can test pattern generation and side-channel analysis be optimized to effectively detect hardware Trojans with rare activation conditions?

This research theme focuses on developing test generation methods that improve the likelihood of activating and detecting hardware Trojans (HTs), which are often designed to trigger under very rare internal signal conditions. It emphasizes enhancing side-channel analysis techniques by generating input patterns that maximize switching activity in rare nodes or circuits prone to HT insertion, thereby amplifying power or timing anomalies distinguishable from process variation. This area is crucial because small-sized, stealthy HTs remain dormant under conventional testing, impeding their detection.

Key finding: The paper proposes a test vector generation technique that selectively toggles primary inputs based on their relative impact on switching activity of rare nets rather than exhaustive or Hamming-distance-based search,... Read more
Key finding: This work introduces a hybrid ATPG technique combining Genetic Algorithms with Boolean Satisfiability for generating test vectors targeting rare internal nodes that serve as HT triggers. It accounts for feasible payload nodes... Read more
Key finding: The authors apply combinatorial testing to efficiently trigger hardware Trojans in a black-box manner, demonstrating through experiments on AES cryptographic hardware that test suites require only a small number of test... Read more
Key finding: This paper develops a procedure for identifying potential insertion sites for HTs by analyzing gates that have rare controllability and low criticality, and selecting trigger nodes based on rare signal probabilities and... Read more

2. What strategies combine design-for-trust approaches and detection frameworks to mitigate hardware Trojans in third-party designs and complex supply chains?

This theme investigates methodologies that integrate design-time preventive techniques such as logic locking, design-for-trust insertions, and post-manufacturing verification to reduce the risk posed by hardware Trojans in outsourced, third-party intellectual property (IP) cores and complex supply chains. It includes both formal and statistical verification frameworks, feature extraction and multi-level analysis for IP trust verification, and methods for enhancing Trojan detectability through structural modifications. The goal is a scalable, efficient framework to ensure trustworthiness and detect stealthy Trojans in real-world IP reuse scenarios.

Key finding: This work highlights the critical role of hardware-level security foundations for Internet of Things (IoT) devices due to their vulnerability to lifelong deployment without frequent updates. It systematically categorizes... Read more
Key finding: The authors propose ML-FASTrust, a multi-level framework combining flip-flop level structural analysis and combinational logic level quantitative metrics to efficiently detect both explicitly- and implicitly-triggered HTs in... Read more
Key finding: This paper presents a novel partial-scan design test generation technique that synergistically combines Automatic Test Pattern Generation (ATPG) and model checking to activate hardware Trojans in large sequential designs. By... Read more
Key finding: Introduces an automated low-overhead online detection scheme that inserts reliability-focused checking circuits at optimized netlist sites selected via intelligent fault propagation analysis. The scheme enhances detection of... Read more

3. How can hardware Trojan detection be enhanced by hardware reverse engineering, optical imaging, and machine learning approaches across different abstraction levels?

This theme explores advanced hardware Trojan detection by employing reverse engineering workflows, non-destructive backside optical watermark imaging, and machine learning models applied at Register Transfer Level (RTL), gate-level netlists, and physical layouts. The focus is on practical, scalable detection methods that do not require Golden chips or full netlist extraction, improve detection resolution against small Trojans, and interpret complex feature sets for trustworthy decision-making. These approaches address the physical and design-level verification challenges and utilize statistical and explainable AI techniques to improve accuracy and explainability in Trojan detection.

Key finding: ViTaL introduces a statistical validation framework that quantitatively assesses hardware reverse engineering (RE) processes considering manufacturing and RE-induced errors for verifying layout integrity without full netlist... Read more
Key finding: Proposes an innovative technique engineering fill cells in standard cell libraries to be highly reflective in the near-infrared spectrum, enabling optical backside imaging to form a unique watermark pattern of chip layout.... Read more
Key finding: Combines side-channel power analysis with machine learning techniques on acquired power traces and logic test data to build a hardware Trojan detector implementable on low-cost Arduino microcontrollers. The model successfully... Read more
Key finding: Develops an efficient hardware Trojan detection model operating at RTL using a novel single branching feature extracted directly from RTL code, avoiding complex feature extraction from gate-level data. The model, trained and... Read more
Key finding: Proposes a Light Gradient Boosting (LGB) machine learning framework combining structural and SCOAP features along with a novel quartile-based SHAP-driven feature selection method to identify hardware Trojan nets in gate-level... Read more

All papers in Hardware Trojan Detection

A hardware Trojan is a malicious modification to an integrated circuit (IC) made by untrusted third-party vendors, fabrication facilities, or rogue designers. Although existing hardware Trojans are designed to be stealthy, they can, in... more
Most semiconductor companies outsource the manufacturing of their chip designs to third-party fabrication foundries. However, untrusted foundries pose significant security risks, including intellectual property (IP) piracy and the... more
Logic locking is frequently used to protect integrated circuits against reverse engineering and intellectual property theft. However, classic gate-level locking approaches are becoming more vulnerable to machine learning (ML)-based... more
These days, hardware devices and its associated activities are greatly impacted by threats amidst of various technologies. Hardware trojans are malicious modifications made to the circuitry of an integrated circuit, Exploiting such... more
and Computer Engineering Today, electronic computing devices are critically involved in our daily lives, basic infrastructure, and national defense systems. With the growing number of threats against them, hardware-based security features... more
The hardware Trojan threat has motivated development of Trojan detection schemes at all stages of the integrated circuit (IC) lifecycle. While the majority of existing schemes focus on ICs at test-time, there are many unique advantages... more
Hardware piracy is a threat that is becoming more and more serious these last years. The different types of threats include mask theft, illegal overproduction, as well as the insertion of malicious alterations to a circuit, referred to as... more
Hardware piracy is a threat that is becoming more and more serious these last years. The different types of threats include mask theft, illegal overproduction, as well as the insertion of malicious alterations to a circuit, referred to as... more
Due to the evolution in the Integrated Circuit (IC) supply chain, soft/firm/hard cores involved in a system under development and manufactured ICs come from numerous, and possibly unreliable, sources. This loss of control over the entire... more
Software test suites based on the concept of interaction testing are very useful for testing software components in an economical way. Test suites of this kind may be created using mathematical objects called covering arrays. A covering... more
Contemporary hardware design shares many similarities with software development. The injection of malicious functionality (Trojans) in FPGA designs is a realistic threat. Established techniques for testing correctness do not cope well... more
Detecting hardware trojans is a difficult task in general. In this article we study hardware trojan horses insertion and detection in cryptographic intellectual property (IP) blocks. The context is that of a fabless design house that... more
Hardware Trojan detection has been the subject of many studies in the realm of hardware security in the recent years. The effectiveness of current techniques proposed for Trojan detection is limited by some factors, process variation... more
Nowadays there are different kinds of attacks on Field Programmable Gate Array (FPGA). As FPGAs are used in many different applications, its security becomes an important concern, especially in Internet of Things (IoT) applications.... more
Nowadays the security of the design is so important because of the different available attacks to the system. the main aim of this paper is to improve the security of the circuit design implemented on FPGA device. Two approaches are... more
Wireless networks are now prevalent in most electronic systems, due to the rapid growth of telecommunications, sensor applications, and the Internet of Things. Though wireless devices use some form of encryption, the underlying hardware... more
Traditionally, computer security has been associated with the software security, or the information-data security. Surprisingly, the hardware on which the software executes or the information stored-processed-transmitted has been assumed... more
Design companies often outsource their integrated circuit (IC) fabrication to third parties where ICs are susceptible to malicious acts such as the insertion of a side-channel hardware trojan horse (SCT). In this paper, we present a... more
Design companies often outsource their integrated circuit (IC) fabrication to third parties where ICs are susceptible to malicious acts such as the insertion of a side-channel hardware trojan horse (SCT). In this paper, we present a... more
The design outsourcing of the IC supply chain across the globe has been witnessed as a major trend of the semiconductor design industry in the recent era. The increasing profit margin has been a major boost for this trend. However, the... more
Various design-for-security (DFS) approaches have been proposed earlier for detection of hardware Trojans, which are malicious insertions in Integrated Circuits (ICs). In this paper, we highlight our major findings in terms of innovative... more
The majority of techniques developed to detect hardware trojans are based on specific attributes. Further, the ad hoc approaches employed to design methods for trojan detection are largely ineffective. Hardware trojans have a number of... more
The goal of a hardware attack is to physically access a digital system to obtain secret information or modify the system behavior. These attacks can be classified as covert or overt based on the awareness of the attack. Each hardware... more
Design companies often outsource their integrated circuit (IC) fabrication to third parties where ICs are susceptible to malicious acts such as the insertion of a side-channel hardware trojan horse (SCT). In this paper, we present a... more
The design outsourcing of the IC supply chain across the globe has been witnessed as a major trend of the semiconductor design industry in the recent era. The increasing profit margin has been a major boost for this trend. However, the... more
Design companies often outsource their integrated circuit (IC) fabrication to third parties where ICs are susceptible to malicious acts such as the insertion of a side-channel hardware trojan horse (SCT). In this paper, we present a... more
Malicious hardware modification, also known as hardware Trojan attack, has emerged as a serious security concern for electronic systems. Such attacks compromise the basic premise of hardware root of trust. Over the past decade,... more
Hardware Trojans are a critical security threat to integrated circuits. We propose an optical method to detect and localize Trojans inserted during the chip fabrication stage. We engineer the fill cells in a standard cell library to be... more
The design outsourcing of the IC supply chain across the globe has been witnessed as a major trend of the semiconductor design industry in the recent era. The increasing profit margin has been a major boost for this trend. However, the... more
Software test suites based on the concept of interaction testing are very useful for testing software components in an economical way. Test suites of this kind may be created using mathematical objects called covering arrays. A covering... more
The threat of inserting malicious logic in hardware design is increasing as the digital supply chains are becoming more deep and span the whole globe. Ring oscillators (ROs) can be used to detect deviations of circuit operations due to... more
The work presented in this paper was realized in the frame of the SALWARE project number ANR-13-JS03-0003 supported by the French Agence Nationale de la Recherche.
Detecting hardware trojans is a difficult task in general. In this article we study hardware trojan horses insertion and detection in cryptographic intellectual property (IP) blocks. The context is that of a fabless design house that... more
The general trend in semiconductor industry to separate design from fabrication leads to potential threats from untrusted integrated circuit foundries. In particular, malicious hardware components can be covertly inserted at the foundry... more
Due to the evolution in the Integrated Circuit (IC) supply chain, soft/firm/hard cores involved in a system under development and manufactured ICs come from numerous, and possibly unreliable, sources. This loss of control over the entire... more
A Transient Effect Ring Oscillator (TERO) is a special case of a Ring Oscillator (RO) design that exhibits increased sensitivity to intrinsic noise. It can serve as a basis for implementing a True Random Number Generator (TRNG) or a... more
Hardware Trojan horses are a realistic threat for both ASIC and FPGA systems. Ring Oscillators (ROs) can be used to detect the presence of malicious hardware functionality. The length of an RO is a significant parameter for detecting... more
This paper presents a novel method for locating combinational hardware Trojans (HT) based on fault location approaches used in combinatorial testing. This method relies exclusively on the combinatorial properties of the executed test... more
Due to the increasing use of information and communication technologies in most aspects of life, security of the information has drawn the attention of governments and industry as well as the researchers. In this regard, structural... more
The design outsourcing of the IC supply chain across the globe has been witnessed as a major trend of the semiconductor design industry in the recent era. The increasing profit margin has been a major boost for this trend. However, the... more
Nowadays there are different kinds of attacks on Field Programmable Gate Array (FPGA). As FPGAs are used in many different applications, its security becomes an important concern, especially in Internet of Things (IoT) applications.... more
Field programmable gate arrays (FPGAs) are being increasingly used in a wide range of critical applications, including industrial, automotive, medical, and military systems. Since FPGA vendors are typically fabless, it is more economical... more
The majority of techniques developed to detect hardware trojans are based on specific attributes. Further, the ad hoc approaches employed to design methods for trojan detection are largely ineffective. Hardware trojans have a number of... more
The goal of a hardware attack is to physically access a digital system to obtain secret information or modify the system behavior. These attacks can be classified as covert or overt based on the awareness of the attack. Each hardware... more
Hardware Trojans (HTs) are malicious alterations to a circuit introduced at design or manufacturing phases by an adversary. Due to their diversity, detecting and/or locating them are challenging tasks. Among the different kinds of... more
Title of Thesis: SECURITY THROUGH OBSCURITY: LAYOUT OBFUSCATION OF DIGITAL INTEGRATED CIRCUITS USING DON’T CARE CONDITIONS Sana Mehmood Awan, Master of Science, 2015 Directed By: Professor Gang Qu, Department of Electrical and Computer... more
This paper is a survey of the state-of-the-art Trojan attacks, modeling, and countermeasures.
Globalization has provided us with a vast choice of intellectual property (IP) core suppliers at various levels of the design flow, and parts of a design can now come from anywhere in the world. Examples include processors (ARM, Leon,... more
Hardware Trojan detection and protection is becoming more crucial as more untrusted third parties manufacture many parts of critical systems nowadays. The most common way to detect hardware Trojans is comparing the untrusted design with a... more
Electronic voting (e-voting) systems have been in use since the 1960s. E-voting offers many advantages compared to other voting techniques. However, it also introduces many security challenges. As it may contain malicious back-doors that... more
Download research papers for free!