Modeling and Test Generation for Combinational Hardware Trojans

Manisha Vinta, S. Sivanantham
{"title":"Modeling and Test Generation for Combinational Hardware Trojans","authors":"Manisha Vinta, S. Sivanantham","doi":"10.1109/ITCIndia49857.2020.9171791","DOIUrl":null,"url":null,"abstract":"Because of globalization in the semiconductor industry and manufacturing processes, integrated circuits are more exposed to harmful attacks called hardware Trojan. This can be considered as a serious threat to the Integrated circuits. Due to the inclusion of hardware Trojan into the existing circuit, it causes the possible effects like changing the functionality of the circuit and discharges some-secret information to the attacker. In this paper, we designed a hardware Trojan, which consists of two parts namely Trigger used to activate Trojan and payload, which changes the functionality of the chip normally the payload is an XOR gate. 2K×(K-1) Trojans are generated for a one-line trigger merged with one payload line for a circuit with K signal lines. The Trojan is detected by generating test patterns by using standard ATPG Tools which detects conditional stuck-at faults-and allows us to find the Trojan coverage and in addition to that this model is effective in finding out the real Trojans.","PeriodicalId":346727,"journal":{"name":"2020 IEEE International Test Conference India","volume":"30 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 IEEE International Test Conference India","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ITCIndia49857.2020.9171791","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

Because of globalization in the semiconductor industry and manufacturing processes, integrated circuits are more exposed to harmful attacks called hardware Trojan. This can be considered as a serious threat to the Integrated circuits. Due to the inclusion of hardware Trojan into the existing circuit, it causes the possible effects like changing the functionality of the circuit and discharges some-secret information to the attacker. In this paper, we designed a hardware Trojan, which consists of two parts namely Trigger used to activate Trojan and payload, which changes the functionality of the chip normally the payload is an XOR gate. 2K×(K-1) Trojans are generated for a one-line trigger merged with one payload line for a circuit with K signal lines. The Trojan is detected by generating test patterns by using standard ATPG Tools which detects conditional stuck-at faults-and allows us to find the Trojan coverage and in addition to that this model is effective in finding out the real Trojans.
组合硬件木马的建模与测试生成
由于半导体工业和制造过程的全球化,集成电路更容易受到称为硬件木马的有害攻击。这可以被认为是对集成电路的严重威胁。由于在现有的电路中包含硬件木马,它可能会造成改变电路功能和向攻击者泄露一些机密信息等影响。本文设计了一个硬件木马,它由触发木马和有效载荷两部分组成,改变了芯片的功能,通常有效载荷为异或门。2kx (K-1)木马程序是为带有K信号线的电路的单线触发器与一条有效负载线合并而生成的。该木马是通过使用标准的ATPG工具生成测试模式来检测的,该工具可以检测条件卡故障,并允许我们找到木马的覆盖范围,此外,该模型还可以有效地发现真正的木马。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信