Vakil et al., 2021 - Google Patents
AVATAR: NN-assisted variation aware timing analysis and reporting for hardware trojan detectionVakil et al., 2021
View PDF- Document ID
- 9670357292535567251
- Author
- Vakil A
- Mirzaeian A
- Homayoun H
- Karimi N
- Sasan A
- Publication year
- Publication venue
- IEEE Access
External Links
Snippet
This paper presents AVATAR, a learning-assisted Trojan testing flow to detect hardware Trojans placed into fabricated ICs at an untrusted foundry, without needing a Golden IC. AVATAR is a side-channel delay-based testing solution that is assisted by a learning model …
- 238000001514 detection method 0 title abstract description 139
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/50—Computer-aided design
- G06F17/5009—Computer-aided design using simulation
- G06F17/504—Formal methods
-
- G—PHYSICS
- G01—MEASURING; TESTING
- G01R—MEASURING ELECTRIC VARIABLES; MEASURING MAGNETIC VARIABLES
- G01R31/00—Arrangements for testing electric properties; Arrangements for locating electric faults; Arrangements for electrical testing characterised by what is being tested not provided for elsewhere
- G01R31/28—Testing of electronic circuits, e.g. by signal tracer
- G01R31/317—Testing of digital circuits
- G01R31/3181—Functional testing
- G01R31/3183—Generation of test inputs, e.g. test vectors, patterns or sequence
- G01R31/318385—Random or pseudo-random test pattern
-
- G—PHYSICS
- G01—MEASURING; TESTING
- G01R—MEASURING ELECTRIC VARIABLES; MEASURING MAGNETIC VARIABLES
- G01R31/00—Arrangements for testing electric properties; Arrangements for locating electric faults; Arrangements for electrical testing characterised by what is being tested not provided for elsewhere
- G01R31/28—Testing of electronic circuits, e.g. by signal tracer
- G01R31/317—Testing of digital circuits
- G01R31/3181—Functional testing
- G01R31/3185—Reconfiguring for testing, e.g. LSSD, partitioning
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F7/00—Methods or arrangements for processing data by operating upon the order or content of the data handled
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N99/00—Subject matter not provided for in other groups of this subclass
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Huang et al. | A survey on machine learning against hardware trojan attacks: Recent advances and challenges | |
Salmani | COTD: Reference-free hardware trojan detection and recovery based on controllability and observability in gate-level netlist | |
Liakos et al. | Conventional and machine learning approaches as countermeasures against hardware trojan attacks | |
Vakil et al. | AVATAR: NN-assisted variation aware timing analysis and reporting for hardware trojan detection | |
Yang et al. | Survey: Hardware trojan detection for netlist | |
Wei et al. | Provably complete hardware trojan detection using test point insertion | |
Vakil et al. | Lasca: Learning assisted side channel delay analysis for hardware trojan detection | |
Gubbi et al. | Hardware trojan detection using machine learning: A tutorial | |
Pan et al. | A survey on hardware vulnerability analysis using machine learning | |
Surabhi et al. | Hardware trojan detection using controlled circuit aging | |
Kitsos et al. | Towards a hardware Trojan detection methodology | |
Rajendran et al. | A novel algorithm for hardware trojan detection through reverse engineering | |
Hassan et al. | Circuit topology-aware vaccination-based hardware trojan detection | |
Mukherjee et al. | A comprehensive survey of physical and logic testing techniques for Hardware Trojan detection and prevention | |
Priyatharishini et al. | A deep learning based malicious module identification using stacked sparse autoencoder network for VLSI circuit reliability | |
Kampel et al. | Locating hardware trojans using combinatorial testing for cryptographic circuits | |
Leveugle | Early analysis of fault-based attack effects in secure circuits | |
Meng et al. | Can overclocking detect hardware Trojans? | |
Rajendran et al. | Sok: Physical and logic testing techniques for hardware trojan detection | |
Yust et al. | Structural checking: Detecting malicious logic without a golden reference | |
Jacob et al. | Detection of malicious circuitry using transition probability based node reduction technique | |
Danger et al. | LAOCOÖN: A run-time monitoring and verification approach for hardware trojan detection | |
Vakil | Golden-Chip Free Side Channel Delay Analysis Test for Hardware Trojan and Recycled IC Detection | |
Sruthi et al. | Genetic algorithm based hardware trojan detection | |
Saravanan et al. | A novel approach to detect hardware malware using hamming weight model and one class support vector machine |