301. A Flexible Online Checking Technique to Enhance Hardware Trojan Horse Detectability by Reliability Analysis
- Author
-
Jimson Mathew, Sree Ranjani Rajendran, Rajat Subhra Chakraborty, Samuel Pagliarini, and M. Nirmala Devi
- Subjects
Software_OPERATINGSYSTEMS ,Computer science ,business.industry ,Reliability (computer networking) ,02 engineering and technology ,Automatic test pattern generation ,020202 computer hardware & architecture ,Computer Science Applications ,Human-Computer Interaction ,Hardware trojan horse ,ComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMS ,Hardware Trojan ,Embedded system ,Logic gate ,0202 electrical engineering, electronic engineering, information engineering ,Computer Science (miscellaneous) ,Benchmark (computing) ,Netlist ,020201 artificial intelligence & image processing ,business ,Information Systems ,Electronic circuit - Abstract
Hardware Trojan Horses have emerged as great threats to modern electronic design and manufacturing practices. Because of their inherent surreptitious nature, test vector generation to detect hardware Trojan horses is a difficult problem. Efficient online detection techniques can be more effective in detection of hardware Trojan horses. In this paper, we propose a low-overhead detection technique which inserts malicious logic detection circuitry at netlist sites chosen by an algorithm that employs an intelligent and accurate analysis of fault propagation through logic gates. Proactive system-level countermeasures can be activated on detection of malicious logic, thereby avoiding disastrous system failure. Experimental results on benchmark circuits show close to 100 percent HTH detection coverage when our proposed technique is employed, as well as acceptable overheads.
- Published
- 2017