{"title":"A Novel Framework to Introduce Hardware Trojan Monitors using Model Checking Based Counterexamples: Inspired by Game Theory","authors":"S. R. Hasan, C. Kamhoua, K. Kwiat, L. Njilla","doi":"10.1109/MWSCAS.2018.8623962","DOIUrl":null,"url":null,"abstract":"Interest in hardware Trojan detection has grown tremendously over the last decade. Several methods for detecting hardware Trojan have been proposed. Due to enormity of possible Trojans, researchers believe that runtime detection is required as a last line of defense. However, to cater different types of hardware Trojans, several detection techniques should be concurrently applied. In this paper we propose a framework for optimizing runtime hardware Trojan detection monitors. We propose a formal verification approach to identify the vulnerable behavior of the hardware using the counterexamples generated by model checker. We devised a heuristic to understand the relationship between the counterexamples and required detection unit. To optimize the number of detection techniques, we leveraged Game Theoretic models to obtain a set of optimized design choices.","PeriodicalId":365263,"journal":{"name":"2018 IEEE 61st International Midwest Symposium on Circuits and Systems (MWSCAS)","volume":"74 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 IEEE 61st International Midwest Symposium on Circuits and Systems (MWSCAS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/MWSCAS.2018.8623962","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3
Abstract
Interest in hardware Trojan detection has grown tremendously over the last decade. Several methods for detecting hardware Trojan have been proposed. Due to enormity of possible Trojans, researchers believe that runtime detection is required as a last line of defense. However, to cater different types of hardware Trojans, several detection techniques should be concurrently applied. In this paper we propose a framework for optimizing runtime hardware Trojan detection monitors. We propose a formal verification approach to identify the vulnerable behavior of the hardware using the counterexamples generated by model checker. We devised a heuristic to understand the relationship between the counterexamples and required detection unit. To optimize the number of detection techniques, we leveraged Game Theoretic models to obtain a set of optimized design choices.