Abstract
Fabrication of Integrated Circuits (ICs) is outsourced to third-party foundries to decrease time to market and production cost. Outsourcing renders the ICs vulnerable to malicious modifications. These malicious circuit modifications, known as Hardware Trojans (HTs), tamper with the integrity of intellectual property cores and hence, must be detected accurately. A highly accurate method for detecting HTs is through time-consuming physical inspection of reverse-engineered chips. Apparently, physically inspection of all suspected chips is unrealistic. Therefore, the knowledge gained from reverse engineering a single infected IC should be used to detect trojans non-invasively in other ICs. The extra malicious logic, in other suspected chips, can be triggered using suitable test patterns leading to its detection. In order to facilitate detection using test patterns, however, the HT should be mapped to the golden circuit, and automated tools should be used to find appropriate patterns. In this work, we explore the feasibility of this two-step methodology for HT detection by discussing the required steps and identifying the unsolved challenges in each step.
Original language | English (US) |
---|---|
Pages | 205-210 |
Number of pages | 6 |
DOIs | |
State | Published - 2019 |
Event | 2019 International Conference Omni-Layer Intelligent Systems, COINS 2019 - Crete, Greece Duration: May 5 2019 → May 7 2019 |
Conference
Conference | 2019 International Conference Omni-Layer Intelligent Systems, COINS 2019 |
---|---|
Country/Territory | Greece |
City | Crete |
Period | 5/5/19 → 5/7/19 |
Keywords
- Automated IC analysis
- Automated Test Pattern Generation
- Hardware Trojans
- IC Reverse Engineering
ASJC Scopus subject areas
- Software
- Human-Computer Interaction
- Computer Vision and Pattern Recognition
- Computer Networks and Communications