DocumentCode :
3056538
Title :
Trusted RTL: Trojan detection methodology in pre-silicon designs
Author :
Banga, Mainak ; Hsiao, Michael S.
Author_Institution :
Bradley Dept. of Electr. & Comput. Eng., Virginia Tech, Blacksburg, VA, USA
fYear :
2010
fDate :
13-14 June 2010
Firstpage :
56
Lastpage :
59
Abstract :
In this paper, we propose a four-step approach to filter and locate malicious insertion(s) implanted in a third party Intellectual Property (3PIP). In our approach, we first remove those easy-to-detect signals whose activation and propagation are easy using functional vectors. The remaining signals are subjected to a N-detect full-scan ATPG tool to identify those which are functionally hard-to-excite and/or propagate. But unlike recognizing hard-to-detect signal(s), behavioral change brought about by these insertion(s) needs to be taken into account to narrow down their implantation locations. So in our third step, detection condition of suspect signals are cross checked against the spec by a suspect-signal-guided equivalence checking set-up. Finally, a region isolation approach is applied on the filtered signals to determine clusters of untestable gates in the circuit. Experimental results on ISCAS´89 benchmarks show that we are able to return a very small set of candidate locations where the stealthy malicious insertion could reside.
Keywords :
isolation technology; logic gates; monolithic integrated circuits; signal detection; N detect full scan ATPG tool; RTL; functional vector; malicious insertion filteration; malicious insertion location; presilicon design; region isolation approach; signal detection; signal propagation; suspect signal guided equivalence checking; third party intellectual property; trojan detection methodology; untestable gate cluster; Automatic test pattern generation; Circuit faults; Circuit synthesis; Circuit testing; Costs; Design methodology; Filters; Globalization; Intellectual property; Signal processing;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Hardware-Oriented Security and Trust (HOST), 2010 IEEE International Symposium on
Conference_Location :
Anaheim, CA
Print_ISBN :
978-1-4244-7811-8
Type :
conf
DOI :
10.1109/HST.2010.5513114
Filename :
5513114
Link To Document :
بازگشت