Back to Search Start Over

Socio-network Analysis of RTL Designs for Hardware Trojan Localization

Authors :
S M Asaduzzaman
Farha Islam Mime
Sheikh Ariful Islam
Farzana Islam
Source :
2019 22nd International Conference on Computer and Information Technology (ICCIT).
Publication Year :
2019
Publisher :
IEEE, 2019.

Abstract

The recent surge in hardware security is significant due to offshoring the proprietary Intellectual property (IP). One distinct dimension of the disruptive threat is malicious logic insertion, also known as Hardware Trojan (HT). HT subverts the normal operations of a device stealthily. The diversity in HTs activation mechanisms and their location in design brings no catch-all detection techniques. In this paper, we propose to leverage principle features of social network analysis to security analysis of Register Transfer Level (RTL) designs against HT. The approach is based on investigating design properties, and it extends the current detection techniques. In particular, we perform both node- and graph-level analysis to determine the direct and indirect interactions between nets in a design. This technique helps not only in finding vulnerable nets that can act as HT triggering signals but also their interactions to influence a particular net to act as HT payload signal. We experiment the technique on 420 combinational HT instances, and on average, we can detect both triggering and payload signals with accuracy up to 97.37%.<br />Comment: Accepted to be Published in: Proceedings of the 2019 22nd International Conference on Computer and Information Technology (ICCIT), 18-20 December 2019, Dhaka, Bangladesh

Details

Database :
OpenAIRE
Journal :
2019 22nd International Conference on Computer and Information Technology (ICCIT)
Accession number :
edsair.doi.dedup.....81890a177d4ef8b8492b17eb9a89eb80
Full Text :
https://doi.org/10.1109/iccit48885.2019.9038608