{"title":"特洛伊木马插入完全可编程的阀门阵列","authors":"Nadun Sinhabahu, Jian-De Li, Katherine Shu-Min Li, Sying-Jyan Wang, Tsung-Yi Ho","doi":"10.1109/ETS54262.2022.9810384","DOIUrl":null,"url":null,"abstract":"Fully programmable valve arrays (FPVAs) have emerged as a new technology commonly used for biochemical applications. FPVAs have the programmability to perform any bioassay as long as users obtain the fluidic-level synthesis results to configure the fluid loading. Users can purchase a bioassay and the corresponding synthesis result from any bioassay provider. However, the distributed design stages are vulnerable to security threats. Trojans are the most critical threats since they can be inserted in any design stage. Even worse, Trojans would not result in a significant deviation from the original synthesis results, while they can affect the bioassay execution dramatically. In this paper, we propose the six Trojan models for FPVAs and a systematic method for Trojan insertion. In the experiments, we insert Trojans into ten test cases. Most of the Trojan-inserted synthesis results are similar to Trojan-free ones in terms of the efficiency metrics. In other words, the experimental results show that the proposed Trojans for FPVAs are stealthy.","PeriodicalId":334931,"journal":{"name":"2022 IEEE European Test Symposium (ETS)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Trojan Insertions of Fully Programmable Valve Arrays\",\"authors\":\"Nadun Sinhabahu, Jian-De Li, Katherine Shu-Min Li, Sying-Jyan Wang, Tsung-Yi Ho\",\"doi\":\"10.1109/ETS54262.2022.9810384\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Fully programmable valve arrays (FPVAs) have emerged as a new technology commonly used for biochemical applications. FPVAs have the programmability to perform any bioassay as long as users obtain the fluidic-level synthesis results to configure the fluid loading. Users can purchase a bioassay and the corresponding synthesis result from any bioassay provider. However, the distributed design stages are vulnerable to security threats. Trojans are the most critical threats since they can be inserted in any design stage. Even worse, Trojans would not result in a significant deviation from the original synthesis results, while they can affect the bioassay execution dramatically. In this paper, we propose the six Trojan models for FPVAs and a systematic method for Trojan insertion. In the experiments, we insert Trojans into ten test cases. Most of the Trojan-inserted synthesis results are similar to Trojan-free ones in terms of the efficiency metrics. In other words, the experimental results show that the proposed Trojans for FPVAs are stealthy.\",\"PeriodicalId\":334931,\"journal\":{\"name\":\"2022 IEEE European Test Symposium (ETS)\",\"volume\":\"34 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-05-23\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 IEEE European Test Symposium (ETS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ETS54262.2022.9810384\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 IEEE European Test Symposium (ETS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ETS54262.2022.9810384","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Trojan Insertions of Fully Programmable Valve Arrays
Fully programmable valve arrays (FPVAs) have emerged as a new technology commonly used for biochemical applications. FPVAs have the programmability to perform any bioassay as long as users obtain the fluidic-level synthesis results to configure the fluid loading. Users can purchase a bioassay and the corresponding synthesis result from any bioassay provider. However, the distributed design stages are vulnerable to security threats. Trojans are the most critical threats since they can be inserted in any design stage. Even worse, Trojans would not result in a significant deviation from the original synthesis results, while they can affect the bioassay execution dramatically. In this paper, we propose the six Trojan models for FPVAs and a systematic method for Trojan insertion. In the experiments, we insert Trojans into ten test cases. Most of the Trojan-inserted synthesis results are similar to Trojan-free ones in terms of the efficiency metrics. In other words, the experimental results show that the proposed Trojans for FPVAs are stealthy.