Hardware Trojan Detection in Third-Party Digital Intellectual Property Cores by Multilevel Feature Analysis

Xiaoming Chen,Qiaoyi Liu,Song Yao,Jia Wang,Qiang Xu,Yu Wang,Yongpan Liu,Huazhong Yang
DOI: https://doi.org/10.1109/tcad.2017.2748021
IF: 2.9
2017-01-01
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems
Abstract:In modern integrated circuit (IC) designs, intellectual property (IP) cores are often outsourced and designed by third-party vendors, resulting in the partial relinquishment of the control over the IC design flow. Thus, reliable verifications are required to mitigate the threat of hardware Trojans (HTs) which may be inserted into IP cores by malicious vendors. Existing trustiness verification methods cannot take the merit of high efficiency and accuracy at the same time. In this paper, we propose a multilevel fast trustiness verification framework based on feature analysis to detect HTs in third-party digital IP cores. The proposed framework combines flip-flop level and combinational logic level feature analysis to achieve both high efficiency and accuracy. Experimental results demonstrate that both explicitly and implicitly triggered HTs can be detected in very short time with a negligible false positive rate. More importantly, our framework has the unique advantage of being scalable to defend against future and stealthier HTs by adding new features into the framework.
What problem does this paper attempt to address?