Advertisement

Circuit Vulnerabilities to Hardware Trojans at the Register-Transfer Level

  • Hassan Salmani
Chapter
  • 535 Downloads

Abstract

Realized by modifying design implementation, hardware Trojans can interfere with any step of the design process. A hardware Trojan may undermine a system’s confidentiality by leaking secret information or can abrogate system availability by performing a malfunction. Soft third-party intellectual properties (IPs) are extensively used in high-level implementation, and they are highly vulnerable to hardware Trojan insertion. Therefore, there is a need for systematic approaches to assess vulnerabilities of a circuit to hardware Trojan insertion and to identify potential hardware Trojan locations at the register-transfer level.

Keywords

Hardware Trojan Register Transfer Level Weight Values Range High Hardness Conditions Condition Stack 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. 1.
    H. Salmani, M. Tehranipoor, Analyzing circuit vulnerability to hardware Trojan insertion at the behavioral level, in 2013 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFTS) (2013), pp. 190–195Google Scholar
  2. 2.
    W.H. Harrison, Compiler analysis of the value ranges for variables. IEEE Trans. Softw. Eng. 3(3), 243–250 (1977)Google Scholar
  3. 3.
    ITC99 benchmarks. http://www.cad.polito.it/downloads/tools/itc99.html. Accessed 22 Jan 2018
  4. 4.
    Simple-as-possible (SAP) microprocessor. http://opencores.org/project,sap. Accessed 22 Jan 2018
  5. 5.
    M. Dale, Verification crisis: managing complexity in SoC designs. https://www.eetimes.com/document.asp?doc_id=1215507. Accessed 22 Jan 2018
  6. 6.
    N. Fern, S. Kulkarni, K.-T.T. Cheng, Hardware Trojans hidden in RTL don’t cares – automated insertion and prevention methodologies, in International Test Conference (ITC), October 2015Google Scholar
  7. 7.
    N. Fern, K.-T.T. Cheng, Verification and trust for unspecified IP functionality, in Hardware IP Security and Trust (Springer, 2017)Google Scholar
  8. 8.
    N. Fern, I. San, K.-T.T. Cheng, Detecting hardware Trojans in unspecified functionality through solving satisfiability problems, in Asia and South Pacific Design Automation Conference (ASP-DAC), January 2017Google Scholar
  9. 9.
    C. Rebeiro, D. Mukhopadhyay, High Speed Compact Elliptic Curve Cryptoprocessor for FPGA Platforms (Springer, Berlin, 2008), pp. 376–388Google Scholar
  10. 10.
    X. Zhang, M. Tehranipoor, Case study: detecting hardware Trojans in third-party digital IP cores, in 2011 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST) (2011), pp. 67–70Google Scholar
  11. 11.
    Trust-HUB. https://www.trust-hub.org/. Accessed 22 Jan 2018

Copyright information

© Springer International Publishing AG, part of Springer Nature 2018

Authors and Affiliations

  • Hassan Salmani
    • 1
  1. 1.EECS DepartmentHoward UniversityWashington, DCUSA

Personalised recommendations