DocumentCode :
3575134
Title :
A Process for the Detection of Design-Level Hardware Trojans Using Verification Methods
Author :
Krieg, Christian ; Rathmair, Michael ; Schupfer, Florian
Author_Institution :
Inst. of Comput. Technol., Vienna Univ. of Technol., Vienna, Austria
fYear :
2014
Firstpage :
729
Lastpage :
734
Abstract :
Hardware Trojans have emerged as a serious threat the past years. Several methods to detect possible hardware Trojans have been published, most of them aiming at detection during post-fabrication tests. Nevertheless, hardware Trojans are more probable to be inserted at design-level, as resources required to do so are much lower than those at fabrication. At design-level, verification methods have been shown to serve for Trojan detection. In this paper, we propose a design process to utilize verification methods in hardware Trojan detection, being able to be integrated into a state-of-the-art design flow for embedded systems. We outline the fundamental basics of verification methods and go then into the details of each step in the process. We identify assets and attackers, and outline which methods are suited to defend against which type of attack.
Keywords :
embedded systems; invasive software; program testing; program verification; design flow; design process; design-level hardware Trojan detection; embedded system; post-fabrication test; verification method; Boolean functions; Data structures; Hardware; Model checking; Reachability analysis; Trojan horses; Formal Verification; Hardware Trojan; Model Checking; design-level Trojan;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
High Performance Computing and Communications, 2014 IEEE 6th Intl Symp on Cyberspace Safety and Security, 2014 IEEE 11th Intl Conf on Embedded Software and Syst (HPCC,CSS,ICESS), 2014 IEEE Intl Conf on
Print_ISBN :
978-1-4799-6122-1
Type :
conf
DOI :
10.1109/HPCC.2014.112
Filename :
7056825
Link To Document :
بازگشت