Hardware Trojan Detection Technology Based on Probabilistic Signature

Zhao-xia ZHENG,Yi-fan LI,Liang YU,Yuan TIAN,Zheng-lin LIU
DOI: https://doi.org/10.3969/j.issn.1000-3428.2014.03.004
2014-01-01
Abstract:Trojan circuits can bypass traditional defensive techniques as they occupy a layer below the entire software stack. This paper proposes a hardware trojan detection technology based on probabilistic signature. Based on logic detection technology, using random and hypothesis algorithm, this paper constructs the probability signature of circuits(Boolean functions), as the unique identifier template. When the signature of circuit under test does not match the template, an alarm is launched. It designs two circuits that implement full adder and AES encryption, and then they are implanted with common hardware Trojan. It makes in-depth theoretical analysis and research on whether the probabilistic signature of the circuits implanted with hardware Trojans is changed in comparison with the two kinds of original circuits. It tests the circuits based on FPGA platform via probabilistic method. As a result, it is verified that based on the probability signature, it can easily achieve a 95%level of confidence on the detection of hardware Trojans implanted into the combinational logic circuits.
What problem does this paper attempt to address?