Triggering Trojans in SRAM circuits with X-propagation

Senwen Kan, Jennifer Dworak
{"title":"Triggering Trojans in SRAM circuits with X-propagation","authors":"Senwen Kan, Jennifer Dworak","doi":"10.1109/DFT.2014.6962105","DOIUrl":null,"url":null,"abstract":"Over the past several years, there has been growing concern regarding the possibility that Hardware Trojan Horse circuits may be present in 3rd party IP. In this paper, we focus specifically on 3rd party IP related to Static Random-Access Memories (SRAMs), and we demonstrate that some Trojans in production-worthy SRAM circuits can easily evade standard verification techniques. We then describe a novel Trojan detection mechanism based on X-propagation during functional simulation of verification vectors. Our experiments from a silicon-worthy verification environment illustrate that our techniques can be significantly more effective at Trojan detection than standard SRAM verification practices.","PeriodicalId":414665,"journal":{"name":"2014 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFT)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/DFT.2014.6962105","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 6

Abstract

Over the past several years, there has been growing concern regarding the possibility that Hardware Trojan Horse circuits may be present in 3rd party IP. In this paper, we focus specifically on 3rd party IP related to Static Random-Access Memories (SRAMs), and we demonstrate that some Trojans in production-worthy SRAM circuits can easily evade standard verification techniques. We then describe a novel Trojan detection mechanism based on X-propagation during functional simulation of verification vectors. Our experiments from a silicon-worthy verification environment illustrate that our techniques can be significantly more effective at Trojan detection than standard SRAM verification practices.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
基于x传播的SRAM电路中触发木马
在过去的几年里,越来越多的人担心硬件特洛伊木马电路可能存在于第三方IP中。在本文中,我们特别关注与静态随机存取存储器(SRAM)相关的第三方IP,并且我们证明了一些具有生产价值的SRAM电路中的特洛伊木马可以很容易地逃避标准验证技术。然后,我们在验证向量的功能仿真中描述了一种基于x传播的木马检测机制。我们在一个有价值的硅验证环境中进行的实验表明,我们的技术在特洛伊木马检测方面比标准的SRAM验证实践更有效。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Automated formal approach for debugging dividers using dynamic specification Artificial intelligence based task mapping and pipelined scheduling for checkpointing on real time systems with imperfect fault detection Characterizing soft error vulnerability of cache coherence protocols for chip-multiprocessors SAM: A comprehensive mechanism for accessing embedded sensors in modern SoCs Designs and analysis of non-volatile memory cells for single event upset (SEU) tolerance
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1