TRAP-GATE: A Probabilistic Approach to Enhance Hardware Trojan Detection and its Game Theoretic Analysis
Autor: | Sivappriya Manivannan, Lakshmi Kuppusamy, N. Sarat Chandra Babu |
---|---|
Rok vydání: | 2020 |
Předmět: |
Digital electronics
Correctness Computer science business.industry 020208 electrical & electronic engineering Probabilistic logic 02 engineering and technology Automatic test pattern generation computer.software_genre 020202 computer hardware & architecture Computer engineering Trojan Hardware Trojan 0202 electrical engineering electronic engineering information engineering Benchmark (computing) Malware Electrical and Electronic Engineering business computer |
Zdroj: | Journal of Electronic Testing. 36:607-616 |
ISSN: | 1573-0727 0923-8174 |
DOI: | 10.1007/s10836-020-05907-z |
Popis: | Rescuing Hardware from malware attacks is a great challenge today. Moreover detecting the presence of malicious intrusion using low-cost techniques is very challenging especially when it is believed that hardware Trojans are integrated into the rarely excited nodes. Though logical testing is admitted to be the accurate way to check the functional correctness of the circuit, the method becomes inefficient for circuits requiring humongous number of test patterns to activate the hardware trojan. This paper proposes a probabilistic approach to generate a set of test patterns that activate the Trojan explicitly by observing the incorrect responses to the applied test patterns. Our experimental result in ISCAS’85 benchmark circuits show that the test patterns generated by our approach enclose all nets where there is a high chance for trojan insertion. We stress that though our results are circuit specific, the proposed approach is generic and hence it can be applied to any digital circuit. In fact, we demonstrate that for the C880 circuit, our approach requires only 217 inputs to be tested whereas the naive approach needs 260 test patterns. In addition to the experimental results, we use a game-theoretic framework to show the effectiveness of our approach in generating trojan activating test patterns compared to naive and ATPG testing process. |
Databáze: | OpenAIRE |
Externí odkaz: |