Detecting hardware Trojans in unspecified functionality through solving satisfiability problems

For modern complex designs it is impossible to fully specify design behavior, and only feasible to verify functionally meaningful scenarios. Hardware Trojans modifying only unspecified functionality are not possible to detect using existing verification methodologies and Trojan detection strategies....

Full description

Saved in:
Bibliographic Details
Published in2017 22nd Asia and South Pacific Design Automation Conference (ASP-DAC) pp. 598 - 504
Main Authors Fern, Nicole, San, Ismail, Kwang-Ting Tim Cheng
Format Conference Proceeding
LanguageEnglish
Published IEEE 01.01.2017
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:For modern complex designs it is impossible to fully specify design behavior, and only feasible to verify functionally meaningful scenarios. Hardware Trojans modifying only unspecified functionality are not possible to detect using existing verification methodologies and Trojan detection strategies. We propose a detection methodology for these Trojans by 1) precisely defining "suspicious" unspecified functionality in terms of information leakage, and 2) formulating detection as a satisfiability problem that can take advantage of the recent advances in both boolean and satisfiability modulo theory (SMT) solvers. The formulated detection procedure can be applied to a gate-level design using commercial equivalence checking tools, or directly to the Verilog/VHDL code by reasoning about the satisfiability of SMT expressions built from traversing the data-flow graph. We demonstrate the effectiveness of our approach on an adder coprocessor and a UART communication controller infected with Trojans which process information leaked from the on-chip bus during idle cycles using signals with only partially specified behavior.
ISSN:2153-697X
DOI:10.1109/ASPDAC.2017.7858389