Vedika Saravanan, Mohammad Walid Charrwi, S. Saeed
{"title":"Revisiting Trojan Insertion Techniques for Post-Silicon Trojan Detection Evaluation","authors":"Vedika Saravanan, Mohammad Walid Charrwi, S. Saeed","doi":"10.1109/ISVLSI59464.2023.10238669","DOIUrl":null,"url":null,"abstract":"The distributed supply chain of the semiconductor industry has promoted several attacks at different stages of Integrated Circuit (IC) design and manufacturing. Hardware Trojans (HTs) injected into the IC by a malicious foundry can lead to catastrophic consequences. Recent research efforts have shown the power of reinforcement learning not only in detecting HTs but also bypassing these detection mechanisms. However, they do not take into account the detailed circuit structural information. In this paper, we explore different new strategies for triggering HTs to evaluate the most recently proposed post-silicon HT detection techniques. Specifically, we develop different automated and scalable rare net selection techniques to construct HT trigger conditions informed by the circuit structure. We evaluate our approaches for different benchmarks against the most recently proposed reinforcement learning and other state-of-the-art logic testing HT detection techniques.","PeriodicalId":199371,"journal":{"name":"2023 IEEE Computer Society Annual Symposium on VLSI (ISVLSI)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 IEEE Computer Society Annual Symposium on VLSI (ISVLSI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISVLSI59464.2023.10238669","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
The distributed supply chain of the semiconductor industry has promoted several attacks at different stages of Integrated Circuit (IC) design and manufacturing. Hardware Trojans (HTs) injected into the IC by a malicious foundry can lead to catastrophic consequences. Recent research efforts have shown the power of reinforcement learning not only in detecting HTs but also bypassing these detection mechanisms. However, they do not take into account the detailed circuit structural information. In this paper, we explore different new strategies for triggering HTs to evaluate the most recently proposed post-silicon HT detection techniques. Specifically, we develop different automated and scalable rare net selection techniques to construct HT trigger conditions informed by the circuit structure. We evaluate our approaches for different benchmarks against the most recently proposed reinforcement learning and other state-of-the-art logic testing HT detection techniques.