TY - GEN
T1 - Monte carlo based test pattern generation for hardware trojan detection
AU - Mingfu, Xue
AU - Aiqun, Hu
AU - Yi, Huang
AU - Guyue, Li
PY - 2013
Y1 - 2013
N2 - Hardware Trojan (HT) has emerged as a serious security threat to many critical systems. HT detection techniques are badly needed to ensure trust in hardware systems. In related works, only a fixed large number of random patterns are applied, with no regard to the pattern's effect to HT detection result. The variations in target signal caused by different sets of input vectors are not addressed. There is also no guarantee that the vector set used is long enough to be representative or whether it is already over testing. To solve these problems, we propose a Monte Carlo based test pattern generation method for HT detection. The proposed approach offers a solution by sampling the detection until the standard deviation of the measured signal over all the samples is within certain accuracy. This gives us the confidence in the signal measurement without having to do exhaustive test. Moreover, it is conducive to simplify test vector sets. Experiment results on ISCAS89 benchmarks showed that the proposed approach usually needs much less time than that required by exhaustive test to achieve reliable results and desired accuracy.
AB - Hardware Trojan (HT) has emerged as a serious security threat to many critical systems. HT detection techniques are badly needed to ensure trust in hardware systems. In related works, only a fixed large number of random patterns are applied, with no regard to the pattern's effect to HT detection result. The variations in target signal caused by different sets of input vectors are not addressed. There is also no guarantee that the vector set used is long enough to be representative or whether it is already over testing. To solve these problems, we propose a Monte Carlo based test pattern generation method for HT detection. The proposed approach offers a solution by sampling the detection until the standard deviation of the measured signal over all the samples is within certain accuracy. This gives us the confidence in the signal measurement without having to do exhaustive test. Moreover, it is conducive to simplify test vector sets. Experiment results on ISCAS89 benchmarks showed that the proposed approach usually needs much less time than that required by exhaustive test to achieve reliable results and desired accuracy.
KW - Monte Carlo technique
KW - hardware Trojan detection
KW - hardware security
KW - information security
KW - test pattern generation
UR - https://www.scopus.com/pages/publications/84904488721
U2 - 10.1109/DASC.2013.50
DO - 10.1109/DASC.2013.50
M3 - 会议稿件
AN - SCOPUS:84904488721
SN - 9781479933815
T3 - Proceedings - 2013 IEEE 11th International Conference on Dependable, Autonomic and Secure Computing, DASC 2013
SP - 131
EP - 136
BT - Proceedings - 2013 IEEE 11th International Conference on Dependable, Autonomic and Secure Computing, DASC 2013
PB - IEEE Computer Society
T2 - 11th IEEE International Conference on Dependable, Autonomic and Secure Computing, DASC 2013
Y2 - 21 December 2013 through 22 December 2013
ER -