首页 > 最新文献

2019 IEEE 28th Asian Test Symposium (ATS)最新文献

英文 中文
Fault Coverage of a Test Set on Structure-Preserving Siblings of a Circuit-Under-Test 被测电路保持结构兄弟上测试集的故障覆盖率
Pub Date : 2019-12-01 DOI: 10.1109/ATS47505.2019.000-5
Manobendra Nath Mondal, A. B. Chowdhury, Manjari Pradhan, S. Sur-Kolay, B. Bhattacharya
Most of the Automatic Test Pattern Generation (ATPG) algorithms for digital circuits rely heavily on netlist description that comprises both network interconnect structure among logic gates and the functionality of each gate. The performance of an ATPG tool on a circuit-under-test (CUT) C is determined by the size of the test set T and its fault coverage (FC). Despite extensive research in the field of testing, the following question remains unanswered: Is the structure or the functionality of C dominant in determining FC of a test-set T for C? In this paper, we present empirical evidence in favour of the dominance of structure on FC by randomly selecting a logic gate from a synthesized netlist for C, and replacing it by a different type of gate. Our experiments provide an un-intuitive result that F C of a test-set T for C under the single stuck-at fault model remains nearly the same on other sibling circuits that have identical structure as of C but with different gate functionality, provided these have similar extent of fault redundancy. This observation supports the view that feeding structural information alone may suffice to train machine-learning models that are currently being used to expedite different problems of digital circuit testing and diagnosis.
大多数用于数字电路的自动测试模式生成(ATPG)算法严重依赖于网表描述,网表描述包括逻辑门之间的网络互连结构和每个门的功能。ATPG工具在待测电路(CUT) C上的性能取决于测试集T的大小及其故障覆盖率(FC)。尽管在测试领域进行了广泛的研究,但以下问题仍未得到解答:C的结构或功能在决定C的测试集T的FC中占主导地位吗?在本文中,我们通过从C的合成网表中随机选择一个逻辑门,并用不同类型的门代替它,提出了支持FC结构优势的经验证据。我们的实验提供了一个非直观的结果,即在单个卡在故障模型下,测试集T对于C的F C在具有与C相同结构但具有不同门功能的其他兄弟电路上几乎保持相同,前提是这些电路具有相似程度的故障冗余。这一观察结果支持了这样一种观点,即仅提供结构信息可能足以训练机器学习模型,这些模型目前被用于加速数字电路测试和诊断的不同问题。
{"title":"Fault Coverage of a Test Set on Structure-Preserving Siblings of a Circuit-Under-Test","authors":"Manobendra Nath Mondal, A. B. Chowdhury, Manjari Pradhan, S. Sur-Kolay, B. Bhattacharya","doi":"10.1109/ATS47505.2019.000-5","DOIUrl":"https://doi.org/10.1109/ATS47505.2019.000-5","url":null,"abstract":"Most of the Automatic Test Pattern Generation (ATPG) algorithms for digital circuits rely heavily on netlist description that comprises both network interconnect structure among logic gates and the functionality of each gate. The performance of an ATPG tool on a circuit-under-test (CUT) C is determined by the size of the test set T and its fault coverage (FC). Despite extensive research in the field of testing, the following question remains unanswered: Is the structure or the functionality of C dominant in determining FC of a test-set T for C? In this paper, we present empirical evidence in favour of the dominance of structure on FC by randomly selecting a logic gate from a synthesized netlist for C, and replacing it by a different type of gate. Our experiments provide an un-intuitive result that F C of a test-set T for C under the single stuck-at fault model remains nearly the same on other sibling circuits that have identical structure as of C but with different gate functionality, provided these have similar extent of fault redundancy. This observation supports the view that feeding structural information alone may suffice to train machine-learning models that are currently being used to expedite different problems of digital circuit testing and diagnosis.","PeriodicalId":258824,"journal":{"name":"2019 IEEE 28th Asian Test Symposium (ATS)","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122627210","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Machine-Learning-Based Multiple Abstraction-Level Detection of Hardware Trojan Inserted at Register-Transfer Level 基于机器学习的多抽象层检测在寄存器传输层插入的硬件木马
Pub Date : 2019-12-01 DOI: 10.1109/ATS47505.2019.00018
Hau Sim Choo, C. Y. Ooi, M. Inoue, N. Ismail, M. Moghbel, Sreedharan Baskara Dass, Chee Hoo Kok, F. Hussin
Hardware Trojan refers to a malicious modification of an integrated circuit (IC). To eliminate the complications arising from designing an IC which includes a Trojan, it is suggested to apply Trojan detection as early as at register-transfer level (RTL). In this paper, we propose a hardware Trojan detection framework which consists of both RTL and gate-level classification using machine learning approaches to detect hardware Trojan inserted at RTL. In the experiment, all Trojan benchmarks were successfully identified without false positive detection on non-Trojan benchmark.
硬件木马是指对集成电路进行恶意修改。为了消除设计包含木马的集成电路所引起的复杂性,建议早在寄存器传输级(RTL)应用木马检测。在本文中,我们提出了一个硬件木马检测框架,该框架由RTL和门级分类组成,使用机器学习方法检测在RTL插入的硬件木马。在实验中,所有木马基准测试都被成功识别,而非木马基准测试没有出现误报。
{"title":"Machine-Learning-Based Multiple Abstraction-Level Detection of Hardware Trojan Inserted at Register-Transfer Level","authors":"Hau Sim Choo, C. Y. Ooi, M. Inoue, N. Ismail, M. Moghbel, Sreedharan Baskara Dass, Chee Hoo Kok, F. Hussin","doi":"10.1109/ATS47505.2019.00018","DOIUrl":"https://doi.org/10.1109/ATS47505.2019.00018","url":null,"abstract":"Hardware Trojan refers to a malicious modification of an integrated circuit (IC). To eliminate the complications arising from designing an IC which includes a Trojan, it is suggested to apply Trojan detection as early as at register-transfer level (RTL). In this paper, we propose a hardware Trojan detection framework which consists of both RTL and gate-level classification using machine learning approaches to detect hardware Trojan inserted at RTL. In the experiment, all Trojan benchmarks were successfully identified without false positive detection on non-Trojan benchmark.","PeriodicalId":258824,"journal":{"name":"2019 IEEE 28th Asian Test Symposium (ATS)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129205676","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Net Classification Based on Testability and Netlist Structural Features for Hardware Trojan Detection 基于可测试性和网表结构特征的网络分类在硬件木马检测中的应用
Pub Date : 2019-12-01 DOI: 10.1109/ATS47505.2019.00020
Chee Hoo Kok, C. Y. Ooi, M. Inoue, M. Moghbel, Sreedharan Baskara Dass, Hau Sim Choo, N. Ismail, F. Hussin
As integrated chip (IC) is one of the most essential components for communication devices, enhancing the integrity of hardware security is essential to prevent any security breach. Implantation of Hardware Trojan (HT) into the IC is one of the most threatening hardware security risks since most of the IC design and fabrication phases are outsourced to third-party foundries. Gate-level netlist inspection is utterly important as HT could be easily hidden among the primitives of the circuit which makes the detection challenging. Previously, HT detection methods for gate-level netlist were mainly based on either net testability or net's structural features. In this paper, we proposed to consolidate these two types of features into a single feature vector to train supervised machine learning classifiers. We also analyzed the performance of the classifiers based on different combinations of features using Minimum Redundancy and Maximum Relevance (mRMR) technique. Using the best feature combination, we achieved a 99.85% True Positive Rate (TPR), 99.95% True Negative Rate (TNR) and 99.90% accuracy (ACC). The results were validated using 10-fold cross-validation.
集成芯片(integrated chip, IC)是通信设备中最重要的部件之一,提高硬件安全的完整性对于防止任何安全漏洞至关重要。由于大多数集成电路设计和制造阶段都外包给第三方代工厂,因此植入硬件木马(HT)是最具威胁性的硬件安全风险之一。门级网表检测非常重要,因为HT很容易隐藏在电路的原语中,这使得检测具有挑战性。以往,门级网表的高温检测方法主要基于网络的可测试性或网络的结构特征。在本文中,我们提出将这两种类型的特征合并为单个特征向量来训练监督机器学习分类器。我们还使用最小冗余和最大相关性(mRMR)技术分析了基于不同特征组合的分类器的性能。使用最佳特征组合,我们获得了99.85%的真阳性率(TPR), 99.95%的真阴性率(TNR)和99.90%的准确率(ACC)。结果采用10倍交叉验证。
{"title":"Net Classification Based on Testability and Netlist Structural Features for Hardware Trojan Detection","authors":"Chee Hoo Kok, C. Y. Ooi, M. Inoue, M. Moghbel, Sreedharan Baskara Dass, Hau Sim Choo, N. Ismail, F. Hussin","doi":"10.1109/ATS47505.2019.00020","DOIUrl":"https://doi.org/10.1109/ATS47505.2019.00020","url":null,"abstract":"As integrated chip (IC) is one of the most essential components for communication devices, enhancing the integrity of hardware security is essential to prevent any security breach. Implantation of Hardware Trojan (HT) into the IC is one of the most threatening hardware security risks since most of the IC design and fabrication phases are outsourced to third-party foundries. Gate-level netlist inspection is utterly important as HT could be easily hidden among the primitives of the circuit which makes the detection challenging. Previously, HT detection methods for gate-level netlist were mainly based on either net testability or net's structural features. In this paper, we proposed to consolidate these two types of features into a single feature vector to train supervised machine learning classifiers. We also analyzed the performance of the classifiers based on different combinations of features using Minimum Redundancy and Maximum Relevance (mRMR) technique. Using the best feature combination, we achieved a 99.85% True Positive Rate (TPR), 99.95% True Negative Rate (TNR) and 99.90% accuracy (ACC). The results were validated using 10-fold cross-validation.","PeriodicalId":258824,"journal":{"name":"2019 IEEE 28th Asian Test Symposium (ATS)","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130426348","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Recruiting Fault Tolerance Techniques for Microprocessor Security 微处理器安全中的容错技术
Pub Date : 2019-12-01 DOI: 10.1109/ATS47505.2019.00015
Vinay B. Y. Kumar, S. Deb, Rupesh Kumar, Mustafa Khairallah, A. Chattopadhyay, A. Mendelson
The growing threat of various attacks on modern microprocessors and systems calls for major design overhauls ranging from plugging micro-architectural side channels such as due to speculative execution to implementing cryptographic accelerators for side-channel and fault attack resistance. In this paper, we suggest to focus on the similarities and the differences between fault tolerance techniques and countermeasures against attacks on security sensitive systems. Modern digital circuits and systems use a diverse set of techniques to ensure operational correctness in the presence of faults. From a security perspective, the goal is to ensure a set of stated security properties hold in the presence of 'security faults' (extending the notion of conventional faults to include injected faults as well as vulnerabilities such as passive side-channels). A point of note here is that under some security faults, the operational correctness may not be compromised. This paper advocates the re-purposing of some of the known fault tolerance techniques, and show how those can be useful for enhancing security in the presence of active side-channel attacks. As a simple illustration of these ideas, we present an experimental case study in fortifying a cryptographic sub-component of a RISC-V based secure system-on-chip, against a formidable fault attack called SIFA.
对现代微处理器和系统的各种攻击日益增长的威胁要求进行重大设计检修,从堵塞微架构侧通道(如由于推测执行)到实现用于侧通道和故障攻击抵抗的加密加速器。在本文中,我们建议关注容错技术与针对安全敏感系统攻击的对策之间的异同。现代数字电路和系统使用多种技术来确保在出现故障时操作的正确性。从安全的角度来看,目标是确保在存在“安全错误”(将常规错误的概念扩展为包括注入错误以及诸如被动侧通道之类的漏洞)的情况下保持一组声明的安全属性。这里需要注意的一点是,在某些安全性错误下,操作的正确性可能不会受到影响。本文提倡重新利用一些已知的容错技术,并展示了这些技术如何在存在主动侧信道攻击时增强安全性。作为这些想法的简单说明,我们提出了一个实验案例研究,以加强基于RISC-V的安全片上系统的加密子组件,以抵御强大的称为SIFA的故障攻击。
{"title":"Recruiting Fault Tolerance Techniques for Microprocessor Security","authors":"Vinay B. Y. Kumar, S. Deb, Rupesh Kumar, Mustafa Khairallah, A. Chattopadhyay, A. Mendelson","doi":"10.1109/ATS47505.2019.00015","DOIUrl":"https://doi.org/10.1109/ATS47505.2019.00015","url":null,"abstract":"The growing threat of various attacks on modern microprocessors and systems calls for major design overhauls ranging from plugging micro-architectural side channels such as due to speculative execution to implementing cryptographic accelerators for side-channel and fault attack resistance. In this paper, we suggest to focus on the similarities and the differences between fault tolerance techniques and countermeasures against attacks on security sensitive systems. Modern digital circuits and systems use a diverse set of techniques to ensure operational correctness in the presence of faults. From a security perspective, the goal is to ensure a set of stated security properties hold in the presence of 'security faults' (extending the notion of conventional faults to include injected faults as well as vulnerabilities such as passive side-channels). A point of note here is that under some security faults, the operational correctness may not be compromised. This paper advocates the re-purposing of some of the known fault tolerance techniques, and show how those can be useful for enhancing security in the presence of active side-channel attacks. As a simple illustration of these ideas, we present an experimental case study in fortifying a cryptographic sub-component of a RISC-V based secure system-on-chip, against a formidable fault attack called SIFA.","PeriodicalId":258824,"journal":{"name":"2019 IEEE 28th Asian Test Symposium (ATS)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114567161","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Structured Approach for Rapid Identification of Fault-Sensitive Nets in Analog Circuits 模拟电路中故障敏感网络快速识别的结构化方法
Pub Date : 2019-12-01 DOI: 10.1109/ATS47505.2019.00025
Sayandeep Sanyal, A. Patra, P. Dasgupta, M. Bhattacharya
The traditional body of literature on analog testing deals with propagation of faults to the output nets of the circuit. Often the set of detectable faults remains unsatisfactory because suitable stimuli cannot be found for propagating certain faults to the output. Existing technology supports capturing of the state of internal nets of a circuit, thereby enhancing the scope of detecting faults by observing their effect on internal nets. This approach is feasible only if the number of internal nets probed by the built-in test structure is very few. This paper presents a structured approach that identifies the sensitive nets, namely a well chosen small subset of internal nets that are affected by these faults. We utilize the speed of DC analysis and some common behavioral aspects of analog signals to find out this subset. We report dramatic improvement in fault coverage on several circuits including benchmarks.
传统的模拟测试文献处理的是故障向电路输出网络的传播。由于找不到合适的刺激来将某些故障传播到输出,因此可检测的故障集往往不能令人满意。现有技术支持捕获电路内部网络的状态,从而通过观察其对内部网络的影响来扩大故障检测的范围。这种方法只有在内置测试结构探测的内部网数量很少的情况下才可行。本文提出了一种结构化的方法来识别敏感网络,即受这些故障影响的内部网络的一个精心选择的小子集。我们利用直流分析的速度和模拟信号的一些常见行为方面来找出这个子集。我们报告了包括基准在内的几个电路的故障覆盖率的显着改善。
{"title":"A Structured Approach for Rapid Identification of Fault-Sensitive Nets in Analog Circuits","authors":"Sayandeep Sanyal, A. Patra, P. Dasgupta, M. Bhattacharya","doi":"10.1109/ATS47505.2019.00025","DOIUrl":"https://doi.org/10.1109/ATS47505.2019.00025","url":null,"abstract":"The traditional body of literature on analog testing deals with propagation of faults to the output nets of the circuit. Often the set of detectable faults remains unsatisfactory because suitable stimuli cannot be found for propagating certain faults to the output. Existing technology supports capturing of the state of internal nets of a circuit, thereby enhancing the scope of detecting faults by observing their effect on internal nets. This approach is feasible only if the number of internal nets probed by the built-in test structure is very few. This paper presents a structured approach that identifies the sensitive nets, namely a well chosen small subset of internal nets that are affected by these faults. We utilize the speed of DC analysis and some common behavioral aspects of analog signals to find out this subset. We report dramatic improvement in fault coverage on several circuits including benchmarks.","PeriodicalId":258824,"journal":{"name":"2019 IEEE 28th Asian Test Symposium (ATS)","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124107606","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Detailed Fault Model for Physical Quantum Circuits 物理量子电路的详细故障模型
Pub Date : 2019-12-01 DOI: 10.1109/ATS47505.2019.00028
Arighna Deb, D. K. Das
Quantum circuits have recently been developed thanks to the global companies like IBM, Google, Microsoft and Intel. The physical realization of quantum circuits motivates to explore new areas of research. Testing of quantum circuits is one such area which needs significant attention in order to detect faulty gate operations in the circuits. To this end, first we need to identify the different types of faults that can result due to some unwanted physical failures during the implementation of the gate operations. This paper investigates those possibilities of physical failures in realizing the quantum operations and introduces a new family of fault models for quantum circuits. Experimental results include the actual number of newly proposed faults that can occur at the physical level of any quantum circuit.
由于IBM、bb0、微软和英特尔等全球公司的发展,量子电路最近得到了发展。量子电路的物理实现促使人们探索新的研究领域。量子电路的测试就是其中一个需要特别注意的领域,以便检测电路中的错误门操作。为此,首先我们需要确定在实现门操作期间由于一些不需要的物理故障而可能导致的不同类型的故障。本文研究了实现量子运算时物理故障的可能性,并介绍了一种新的量子电路故障模型。实验结果包括在任何量子电路的物理层面上可能出现的新提出的故障的实际数量。
{"title":"Detailed Fault Model for Physical Quantum Circuits","authors":"Arighna Deb, D. K. Das","doi":"10.1109/ATS47505.2019.00028","DOIUrl":"https://doi.org/10.1109/ATS47505.2019.00028","url":null,"abstract":"Quantum circuits have recently been developed thanks to the global companies like IBM, Google, Microsoft and Intel. The physical realization of quantum circuits motivates to explore new areas of research. Testing of quantum circuits is one such area which needs significant attention in order to detect faulty gate operations in the circuits. To this end, first we need to identify the different types of faults that can result due to some unwanted physical failures during the implementation of the gate operations. This paper investigates those possibilities of physical failures in realizing the quantum operations and introduces a new family of fault models for quantum circuits. Experimental results include the actual number of newly proposed faults that can occur at the physical level of any quantum circuit.","PeriodicalId":258824,"journal":{"name":"2019 IEEE 28th Asian Test Symposium (ATS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131325966","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Message from the ATS 2019 Program Co-Chairs ATS 2019项目联合主席致辞
Pub Date : 2019-12-01 DOI: 10.1109/ats47505.2019.00-22
{"title":"Message from the ATS 2019 Program Co-Chairs","authors":"","doi":"10.1109/ats47505.2019.00-22","DOIUrl":"https://doi.org/10.1109/ats47505.2019.00-22","url":null,"abstract":"","PeriodicalId":258824,"journal":{"name":"2019 IEEE 28th Asian Test Symposium (ATS)","volume":"AES-16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126540665","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
GramsDet: Hardware Trojan Detection Based on Recurrent Neural Network 基于递归神经网络的硬件木马检测
Pub Date : 2019-12-01 DOI: 10.1109/ATS47505.2019.00021
Renjie Lu, Haihua Shen, Yu Su, Huawei Li, Xiaowei Li
Hardware Trojan (HT) has paid more and more attention to the academia and industry because of its significant potential threat. In this paper, we propose a novel approach, named GramsDet, to detect HT through capturing suspicious circuit connection structure using recurrent neural network. GramsDet considers that HT usually be inserted into the regions with low transition probability, so the circuit fragments associated with HT should have special connection structures. GramsDet models the target circuit using n-gram circuit segmentation technique, and implements the "gate embedding" by the order-sensitive co-occurrence matrix. Then, a stacked long short-term memory network is designed to build a robust HT detection model. The experimental results on different benchmarks show that GramsDet can detect effectively Trojan logic without the "Golden model" of the circuit under detection (CUD).
硬件木马(Hardware Trojan, HT)由于其巨大的潜在威胁而越来越受到学术界和工业界的重视。在本文中,我们提出了一种名为GramsDet的新方法,通过使用递归神经网络捕获可疑的电路连接结构来检测HT。GramsDet认为HT通常被插入到转移概率较低的区域,因此与HT相关的电路片段应该具有特殊的连接结构。GramsDet采用n图电路分割技术对目标电路进行建模,并通过顺序敏感共现矩阵实现“门嵌入”。在此基础上,设计了堆叠长短期记忆网络,建立了鲁棒的HT检测模型。不同基准测试的实验结果表明,GramsDet可以有效地检测木马逻辑,而不需要被检测电路的“黄金模型”(CUD)。
{"title":"GramsDet: Hardware Trojan Detection Based on Recurrent Neural Network","authors":"Renjie Lu, Haihua Shen, Yu Su, Huawei Li, Xiaowei Li","doi":"10.1109/ATS47505.2019.00021","DOIUrl":"https://doi.org/10.1109/ATS47505.2019.00021","url":null,"abstract":"Hardware Trojan (HT) has paid more and more attention to the academia and industry because of its significant potential threat. In this paper, we propose a novel approach, named GramsDet, to detect HT through capturing suspicious circuit connection structure using recurrent neural network. GramsDet considers that HT usually be inserted into the regions with low transition probability, so the circuit fragments associated with HT should have special connection structures. GramsDet models the target circuit using n-gram circuit segmentation technique, and implements the \"gate embedding\" by the order-sensitive co-occurrence matrix. Then, a stacked long short-term memory network is designed to build a robust HT detection model. The experimental results on different benchmarks show that GramsDet can detect effectively Trojan logic without the \"Golden model\" of the circuit under detection (CUD).","PeriodicalId":258824,"journal":{"name":"2019 IEEE 28th Asian Test Symposium (ATS)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116754592","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Novel Radiation Hardened Latch Design with Cost-Effectiveness for Safety-Critical Terrestrial Applications 具有成本效益的新型辐射硬化锁存设计,用于安全关键的地面应用
Pub Date : 2019-12-01 DOI: 10.1109/ATS47505.2019.000-2
Aibin Yan, Zhen Wu, Lu Lu, Zhili Chen, Jie Song, Zuobin Ying, P. Girard, X. Wen
To meet the requirements of both cost-effectiveness and high reliability for safety-critical terrestrial applications, this paper proposes a novel radiation hardened latch design, namely HLCRT. The HLCRT latch mainly consists of a single-node-upset self-recoverable cell, a 3-input C-element, and an inverter. If any two inputs of the C-element suffer from a double-node-upset (DNU), or if one node inside the cell together with another node outside the cell suffer from a DNU, the latch still has correct values on its output node, i.e., the latch is effectively DNU hardened. Simulation results demonstrate the DNU tolerance of the proposed latch. Moreover, due to the use of fewer transistors, clock gating technologies, and a high-speed path, the proposed latch saves about 444.80% delay, 150.50% power, 72.66% area, and 2029.63% delay-power-area product on average, compared with state-of-the-art DNU hardened latch designs.
为了满足安全关键型地面应用的成本效益和高可靠性要求,本文提出了一种新型的辐射硬化锁存器设计,即HLCRT。HLCRT锁存器主要由一个单节点干扰自恢复单元、一个3输入c单元和一个逆变器组成。如果c单元的任何两个输入都遭受双节点破坏(DNU),或者如果单元内的一个节点与单元外的另一个节点一起遭受DNU,则闩锁在其输出节点上仍然具有正确的值,即闩锁有效地进行DNU硬化。仿真结果验证了该锁存器的DNU容限。此外,由于使用更少的晶体管,时钟门控技术和高速路径,与最先进的DNU硬化锁存器设计相比,所提出的锁存器平均节省约444.80%的延迟,150.50%的功率,72.66%的面积和2029.63%的延迟-功率-面积产品。
{"title":"Novel Radiation Hardened Latch Design with Cost-Effectiveness for Safety-Critical Terrestrial Applications","authors":"Aibin Yan, Zhen Wu, Lu Lu, Zhili Chen, Jie Song, Zuobin Ying, P. Girard, X. Wen","doi":"10.1109/ATS47505.2019.000-2","DOIUrl":"https://doi.org/10.1109/ATS47505.2019.000-2","url":null,"abstract":"To meet the requirements of both cost-effectiveness and high reliability for safety-critical terrestrial applications, this paper proposes a novel radiation hardened latch design, namely HLCRT. The HLCRT latch mainly consists of a single-node-upset self-recoverable cell, a 3-input C-element, and an inverter. If any two inputs of the C-element suffer from a double-node-upset (DNU), or if one node inside the cell together with another node outside the cell suffer from a DNU, the latch still has correct values on its output node, i.e., the latch is effectively DNU hardened. Simulation results demonstrate the DNU tolerance of the proposed latch. Moreover, due to the use of fewer transistors, clock gating technologies, and a high-speed path, the proposed latch saves about 444.80% delay, 150.50% power, 72.66% area, and 2029.63% delay-power-area product on average, compared with state-of-the-art DNU hardened latch designs.","PeriodicalId":258824,"journal":{"name":"2019 IEEE 28th Asian Test Symposium (ATS)","volume":"361 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122762396","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Title Page iii 第三页标题
Pub Date : 2019-12-01 DOI: 10.1109/ats47505.2019.00002
{"title":"Title Page iii","authors":"","doi":"10.1109/ats47505.2019.00002","DOIUrl":"https://doi.org/10.1109/ats47505.2019.00002","url":null,"abstract":"","PeriodicalId":258824,"journal":{"name":"2019 IEEE 28th Asian Test Symposium (ATS)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121882792","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2019 IEEE 28th Asian Test Symposium (ATS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1