Tianliang Xu, Chenxu Wang, Shiyao Zhao, Zhiquan Zhou, Min Luo, Xinsheng Wang
{"title":"一种提高硬件木马激活概率的ATPG方法","authors":"Tianliang Xu, Chenxu Wang, Shiyao Zhao, Zhiquan Zhou, Min Luo, Xinsheng Wang","doi":"10.1109/PACRIM47961.2019.8985088","DOIUrl":null,"url":null,"abstract":"A hardware Trojan is defined as a malicious, undesired modification hidden in an electronic circuit. Since the logic test has the advantage of being free of process fluctuations and test noise, a logic test is used to test whether the circuit under test contains a hardware Trojan. This paper optimizes N-detect ATPG detection scheme to generate optimized test vectors for logic testing. The simulation results on s5378 and s38417 benchmarks demonstrate that, compared with traditional logic test technique, the test vectors generated by this paper are able to successfully increase activation probability of a hardware Trojan and detect abnormal outputs.","PeriodicalId":152556,"journal":{"name":"2019 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing (PACRIM)","volume":"79 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A Novel ATPG Method to Increase Activation Probability of Hardware Trojan\",\"authors\":\"Tianliang Xu, Chenxu Wang, Shiyao Zhao, Zhiquan Zhou, Min Luo, Xinsheng Wang\",\"doi\":\"10.1109/PACRIM47961.2019.8985088\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"A hardware Trojan is defined as a malicious, undesired modification hidden in an electronic circuit. Since the logic test has the advantage of being free of process fluctuations and test noise, a logic test is used to test whether the circuit under test contains a hardware Trojan. This paper optimizes N-detect ATPG detection scheme to generate optimized test vectors for logic testing. The simulation results on s5378 and s38417 benchmarks demonstrate that, compared with traditional logic test technique, the test vectors generated by this paper are able to successfully increase activation probability of a hardware Trojan and detect abnormal outputs.\",\"PeriodicalId\":152556,\"journal\":{\"name\":\"2019 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing (PACRIM)\",\"volume\":\"79 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-08-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2019 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing (PACRIM)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/PACRIM47961.2019.8985088\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing (PACRIM)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/PACRIM47961.2019.8985088","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A Novel ATPG Method to Increase Activation Probability of Hardware Trojan
A hardware Trojan is defined as a malicious, undesired modification hidden in an electronic circuit. Since the logic test has the advantage of being free of process fluctuations and test noise, a logic test is used to test whether the circuit under test contains a hardware Trojan. This paper optimizes N-detect ATPG detection scheme to generate optimized test vectors for logic testing. The simulation results on s5378 and s38417 benchmarks demonstrate that, compared with traditional logic test technique, the test vectors generated by this paper are able to successfully increase activation probability of a hardware Trojan and detect abnormal outputs.