• DocumentCode
    159504
  • Title

    Triggering Trojans in SRAM circuits with X-propagation

  • Author

    Senwen Kan ; Dworak, Jennifer

  • Author_Institution
    Adv. Micro Devices, Austin, TX, USA
  • fYear
    2014
  • fDate
    1-3 Oct. 2014
  • Firstpage
    1
  • Lastpage
    8
  • Abstract
    Over the past several years, there has been growing concern regarding the possibility that Hardware Trojan Horse circuits may be present in 3rd party IP. In this paper, we focus specifically on 3rd party IP related to Static Random-Access Memories (SRAMs), and we demonstrate that some Trojans in production-worthy SRAM circuits can easily evade standard verification techniques. We then describe a novel Trojan detection mechanism based on X-propagation during functional simulation of verification vectors. Our experiments from a silicon-worthy verification environment illustrate that our techniques can be significantly more effective at Trojan detection than standard SRAM verification practices.
  • Keywords
    SRAM chips; invasive software; logic design; 3rd party IP; SRAM circuits; X-propagation; functional simulation; hardware Trojan horse circuits; standard verification techniques; static random access memories; Hardware; Indexes; Integrated circuit modeling; Payloads; Random access memory; System-on-chip; Trojan horses;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFT), 2014 IEEE International Symposium on
  • Conference_Location
    Amsterdam
  • Print_ISBN
    978-1-4799-6154-2
  • Type

    conf

  • DOI
    10.1109/DFT.2014.6962105
  • Filename
    6962105