{"title":"通过指定恶意电路属性来检测硬件木马","authors":"Michael Rathmair, F. Schupfer","doi":"10.1109/ICEIEC.2013.6835515","DOIUrl":null,"url":null,"abstract":"This work addresses the increasing danger of shipping integrated circuits (either fully digital or mixed signal) that contain malicious hardware modifications. Potential security threads are established by so called hardware Trojans, implemented in the physical silicon structure. A desire of system engineers is to identify such back-door functionalities during an early design phase. The paper discusses how techniques deduced from model checking applications can be used for Trojan detection. A set of potential malicious properties is defined and handed to an automatic tool. Any returned counterexample identifies a feasible attack path and is a basis for further detailed inspection.","PeriodicalId":419767,"journal":{"name":"2013 IEEE 4th International Conference on Electronics Information and Emergency Communication","volume":"215 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"16","resultStr":"{\"title\":\"Hardware Trojan detection by specifying malicious circuit properties\",\"authors\":\"Michael Rathmair, F. Schupfer\",\"doi\":\"10.1109/ICEIEC.2013.6835515\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This work addresses the increasing danger of shipping integrated circuits (either fully digital or mixed signal) that contain malicious hardware modifications. Potential security threads are established by so called hardware Trojans, implemented in the physical silicon structure. A desire of system engineers is to identify such back-door functionalities during an early design phase. The paper discusses how techniques deduced from model checking applications can be used for Trojan detection. A set of potential malicious properties is defined and handed to an automatic tool. Any returned counterexample identifies a feasible attack path and is a basis for further detailed inspection.\",\"PeriodicalId\":419767,\"journal\":{\"name\":\"2013 IEEE 4th International Conference on Electronics Information and Emergency Communication\",\"volume\":\"215 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2013-11-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"16\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2013 IEEE 4th International Conference on Electronics Information and Emergency Communication\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICEIEC.2013.6835515\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 IEEE 4th International Conference on Electronics Information and Emergency Communication","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICEIEC.2013.6835515","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Hardware Trojan detection by specifying malicious circuit properties
This work addresses the increasing danger of shipping integrated circuits (either fully digital or mixed signal) that contain malicious hardware modifications. Potential security threads are established by so called hardware Trojans, implemented in the physical silicon structure. A desire of system engineers is to identify such back-door functionalities during an early design phase. The paper discusses how techniques deduced from model checking applications can be used for Trojan detection. A set of potential malicious properties is defined and handed to an automatic tool. Any returned counterexample identifies a feasible attack path and is a basis for further detailed inspection.