Skip to main content

Hardware Trojan Detection Using Effective Test Patterns and Selective Segmentation

  • Conference paper
  • First Online:

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 746))

Abstract

Hardware Trojans (HTs) have become a major threat to the modern fabless semiconductor industry. This has raised serious concerns over integrated circuits (IC) outsourcing. HT detection and diagnosis is challenging due to the diversity of HTs, large number of gates in modern ICs, intrinsic process variation (PV) in IC design and the high cost of testing. An efficient HT detection and diagnosis scheme based on selective segmentation is proposed in this work. It divides the large circuit into small sub-circuits and applies consistency analysis of gate-level properties. In addition, Transition probability (TP) estimation for each node is employed and performed segmentation on the least probable transition nodes. In order to further enhance the detection, optimized test vectors are chosen during the procedure. Based on the selected segments, HTs are detected correctly by tracing gate level properties.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Wei, S., Potkonjak, M.: Self-consistency and consistency-based detection and diagnosis of malicious circuitry. IEEE Trans. Very Large Scale Integr. (VLSI) Syst. 22(9), 1845–1853 (2013)

    Article  Google Scholar 

  2. Wei, S., Potkonjak, M.: Malicious circuitry detection using fast timing characterization via test points. In: Proceedings of the IEEE International Symposium on HOST, pp. 113–118, June 2013

    Google Scholar 

  3. Zhou, B., Zhang, W., Thambipillai, S., Jin, J.T.K.: Cost-efficient acceleration of hardware trojan detection through fan-out cone analysis and weighted random pattern technique. IEEE Trans. Comput.-Aided Des. Integr. Circuits Syst. 35(5), 792–805 (2016)

    Article  Google Scholar 

  4. Wong, J.S.J., Cheung, P.Y.K.: Timing measurement platform for arbitrary black-box circuits based on transition probability. IEEE Trans. Very Large Scale Integr. (VLSI) Syst. 21(12), 2307–2320 (2013)

    Article  Google Scholar 

  5. Wei, S., Potkonjak, M.: Scalable hardware Trojan diagnosis. IEEE Trans. Very Large Scale Integr. (VLSI) Syst. 20(6), 1049–1057 (2012)

    Article  Google Scholar 

  6. Sree Ranjani, R., Nirmala Devi, M.: Malicious hardware detection and design for trust: an analysis. Elektrotehniski Vestn. 84(1–2), 7–16 (2017)

    Google Scholar 

  7. Saran, T., Sree Ranjani, R., Nirmala Devi, M.: A region based fingerprinting for hardware Trojan detection and diagnosis. In: 4th International Conference on Signal Processing and Integrated Networks (SPIN). IEEE (2017)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to K. Atchuta Sashank .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Atchuta Sashank, K., Reddy, H.S., Pavithran, P., Akash, M., Nirmala Devi, M. (2017). Hardware Trojan Detection Using Effective Test Patterns and Selective Segmentation. In: Thampi, S., Martínez Pérez, G., Westphall, C., Hu, J., Fan, C., Gómez Mármol, F. (eds) Security in Computing and Communications. SSCC 2017. Communications in Computer and Information Science, vol 746. Springer, Singapore. https://doi.org/10.1007/978-981-10-6898-0_31

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-6898-0_31

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-6897-3

  • Online ISBN: 978-981-10-6898-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics