• DocumentCode
    613017
  • Title

    A study on the effectiveness of Trojan detection techniques using a red team blue team approach

  • Author

    Zhang, Xiaobing ; Xiao, K. ; Tehranipoor, Mohammad ; Rajendran, Jeyavijayan ; Karri, Ramesh

  • Author_Institution
    Dept. of Electr. & Comput. Eng., Univ. of Connecticut, Storrs, CT, USA
  • fYear
    2013
  • fDate
    April 29 2013-May 2 2013
  • Firstpage
    1
  • Lastpage
    3
  • Abstract
    As part of the Embedded Systems Challenge, we assess the effectiveness of Trojan detection techniques. The red team inserted different types of Trojans - combinational, sequential, reliability degrading, and performance degrading - into selected variants of a target design; the other variants are Trojan-free. The blue team has to correctly classify the Trojan-free and Trojan-infected variants. Seven different teams from six different universities performed the blue team activity using different types of Trojan-detection techniques, namely activation-based detection, and power- and delay-based side-channels.
  • Keywords
    combinational circuits; embedded systems; integrated circuit design; integrated circuit reliability; invasive software; activation-based detection; combinational degrading; delay-based side-channels; embedded systems; power-based side-channels; red team blue team approach; reliability degrading; sequential degrading; target design; trojan detection; trojan-free variants; trojan-infected variants; Clocks; Delays; Hardware; Integrated circuits; Reliability; Trojan horses; Vectors;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    VLSI Test Symposium (VTS), 2013 IEEE 31st
  • Conference_Location
    Berkeley, CA
  • ISSN
    1093-0167
  • Print_ISBN
    978-1-4673-5542-1
  • Type

    conf

  • DOI
    10.1109/VTS.2013.6548922
  • Filename
    6548922