首页> 外文期刊>IEEE transactions on information forensics and security >COTD: Reference-Free Hardware Trojan Detection and Recovery Based on Controllability and Observability in Gate-Level Netlist
【24h】

COTD: Reference-Free Hardware Trojan Detection and Recovery Based on Controllability and Observability in Gate-Level Netlist

机译:COTD:基于门级网表中可控性和可观察性的无参考硬件木马检测和恢复

获取原文
获取原文并翻译 | 示例
           

摘要

This paper presents a novel hardware Trojan detection technique in gate-level netlist based on the controllability and observability analyses. Using an unsupervised clustering analysis, the paper shows that the controllability and observability characteristics of Trojan gates present significant inter-cluster distance from those of genuine gates in a Trojan-inserted circuit, such that Trojan gates are easily distinguishable. The proposed technique does not require any golden model and can be easily integrated into the current integrated circuit design flow. Furthermore, it performs a static analysis and does not require any test pattern application for Trojan activation either partially or fully. In addition, the timing complexity of the proposed technique is an order of the number of signals in a circuit. Moreover, the proposed technique makes it possible to fully restore an inserted Trojan and to isolate its trigger and payload circuits. The technique has been applied on various types of Trojans, and all Trojans are successfully detected with 0 false positive and negative rates in less than 14 s in the worst case.
机译:本文基于可控性和可观察性分析,提出了一种新的门级网表硬件木马检测技术。使用无监督聚类分析,该文件显示,特洛伊木门的可控性和可观察性特征与特洛伊木马插入的电路中的真正门相比,存在明显的集群间距离,因此特洛伊木门很容易区分。所提出的技术不需要任何黄金模型,并且可以容易地集成到当前的集成电路设计流程中。此外,它执行静态分析,不需要任何测试模式应用程序即可部分或完全激活Trojan。另外,所提出的技术的定时复杂度是电路中信号数量的顺序。而且,所提出的技术使得有可能完全恢复插入的特洛伊木马并隔离其触发电路和有效负载电路。该技术已应用于各种类型的特洛伊木马,在最坏的情况下,在不到14秒的时间内,成功检测到所有木马,且出现了0次误报和误报率。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号