TY - GEN
T1 - On design vulnerability analysis and trust benchmarks development
AU - Salmani, Hassan
AU - Tehranipoor, Mohammad
AU - Karri, Ramesh
PY - 2013
Y1 - 2013
N2 - The areas of hardware security and trust have experienced major growth over the past several years. However, research in Trojan detection and prevention lacks standard benchmarks and measurements, resulting in inconsistent research outcomes, and ambiguity in analyzing strengths and weaknesses in the techniques developed by different research teams and their advancements to the state-of-the-art. We have developed innovative methodologies that, for the first time, more effectively address the problem. We have developed a vulnerability analysis flow. The flow determines hard-to-detect areas in a circuit that would most probably be used for Trojan implementation to ensure a Trojan goes undetected during production test and extensive functional test analysis. Furthermore, we introduce the Trojan detectability metric to quantify Trojan activation and effect. This metric offers a fair comparison for analyzing weaknesses and strengths of Trojan detection techniques. Using these methodologies, we have developed a large number of trust benchmarks that are available for use by the public, as well as researchers and practitioners in the field.
AB - The areas of hardware security and trust have experienced major growth over the past several years. However, research in Trojan detection and prevention lacks standard benchmarks and measurements, resulting in inconsistent research outcomes, and ambiguity in analyzing strengths and weaknesses in the techniques developed by different research teams and their advancements to the state-of-the-art. We have developed innovative methodologies that, for the first time, more effectively address the problem. We have developed a vulnerability analysis flow. The flow determines hard-to-detect areas in a circuit that would most probably be used for Trojan implementation to ensure a Trojan goes undetected during production test and extensive functional test analysis. Furthermore, we introduce the Trojan detectability metric to quantify Trojan activation and effect. This metric offers a fair comparison for analyzing weaknesses and strengths of Trojan detection techniques. Using these methodologies, we have developed a large number of trust benchmarks that are available for use by the public, as well as researchers and practitioners in the field.
UR - http://www.scopus.com/inward/record.url?scp=84892521405&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84892521405&partnerID=8YFLogxK
U2 - 10.1109/ICCD.2013.6657085
DO - 10.1109/ICCD.2013.6657085
M3 - Conference contribution
AN - SCOPUS:84892521405
SN - 9781479929870
T3 - 2013 IEEE 31st International Conference on Computer Design, ICCD 2013
SP - 471
EP - 474
BT - 2013 IEEE 31st International Conference on Computer Design, ICCD 2013
PB - IEEE Computer Society
T2 - 2013 IEEE 31st International Conference on Computer Design, ICCD 2013
Y2 - 6 October 2013 through 9 October 2013
ER -