{"title":"紧凑稀有节点硬件木马检测的测试向量生成及灵敏度分析","authors":"G.S Kavya Patel, S. Ramesh, Devi M. Nirmala","doi":"10.1109/DISCOVER55800.2022.9974745","DOIUrl":null,"url":null,"abstract":"Hardware Trojans (HT) emerged as a significant threat to Integrated Circuits (IC) industry that require security and trustworthiness in systems. Detecting HT has become very challenging due to the diversity of Trojans and unpredictable process variations during fabrication. This work presents a test vector generation approach to improve the trojan detection process. The proposed approach tries to trigger the compact rare nodes. The nodes of digital circuit are compact, in which the transition probability is less and has high controllability and observability values are considered as compact. Since, these nodes are the potential point for Hardware Trojan insertion for attackers. Thus, our objective is to trigger those compact rare nodes and change the critical path with compact test patterns to make it very efficient in uncovering the malicious trojan added by attackers utilizing one of the side channel parameters - delay. The experimental results of the proposed method are analyzed using ISCAS’85 benchmark circuits and it shows that trojan detection can be achieved with reduced number of nodes and test vectors.","PeriodicalId":264177,"journal":{"name":"2022 International Conference on Distributed Computing, VLSI, Electrical Circuits and Robotics ( DISCOVER)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Test Vector Generation and Sensitivity Analysis for Hardware Trojan Detection in Compact Rare Nodes\",\"authors\":\"G.S Kavya Patel, S. Ramesh, Devi M. Nirmala\",\"doi\":\"10.1109/DISCOVER55800.2022.9974745\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Hardware Trojans (HT) emerged as a significant threat to Integrated Circuits (IC) industry that require security and trustworthiness in systems. Detecting HT has become very challenging due to the diversity of Trojans and unpredictable process variations during fabrication. This work presents a test vector generation approach to improve the trojan detection process. The proposed approach tries to trigger the compact rare nodes. The nodes of digital circuit are compact, in which the transition probability is less and has high controllability and observability values are considered as compact. Since, these nodes are the potential point for Hardware Trojan insertion for attackers. Thus, our objective is to trigger those compact rare nodes and change the critical path with compact test patterns to make it very efficient in uncovering the malicious trojan added by attackers utilizing one of the side channel parameters - delay. The experimental results of the proposed method are analyzed using ISCAS’85 benchmark circuits and it shows that trojan detection can be achieved with reduced number of nodes and test vectors.\",\"PeriodicalId\":264177,\"journal\":{\"name\":\"2022 International Conference on Distributed Computing, VLSI, Electrical Circuits and Robotics ( DISCOVER)\",\"volume\":\"26 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-10-14\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 International Conference on Distributed Computing, VLSI, Electrical Circuits and Robotics ( DISCOVER)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/DISCOVER55800.2022.9974745\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 International Conference on Distributed Computing, VLSI, Electrical Circuits and Robotics ( DISCOVER)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/DISCOVER55800.2022.9974745","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Test Vector Generation and Sensitivity Analysis for Hardware Trojan Detection in Compact Rare Nodes
Hardware Trojans (HT) emerged as a significant threat to Integrated Circuits (IC) industry that require security and trustworthiness in systems. Detecting HT has become very challenging due to the diversity of Trojans and unpredictable process variations during fabrication. This work presents a test vector generation approach to improve the trojan detection process. The proposed approach tries to trigger the compact rare nodes. The nodes of digital circuit are compact, in which the transition probability is less and has high controllability and observability values are considered as compact. Since, these nodes are the potential point for Hardware Trojan insertion for attackers. Thus, our objective is to trigger those compact rare nodes and change the critical path with compact test patterns to make it very efficient in uncovering the malicious trojan added by attackers utilizing one of the side channel parameters - delay. The experimental results of the proposed method are analyzed using ISCAS’85 benchmark circuits and it shows that trojan detection can be achieved with reduced number of nodes and test vectors.