Potential Trigger Detection for Hardware Trojans
Due to the globalization trend of IC industry, more and more chips are designed and/or fabricated by foreign companies and foundries. Among all the consequences of this globalization trend, the possible existence of stealthy-inserted hardware Trojans (HTs) has raised a great security concern. Withou...
        Saved in:
      
    
          | Published in | IEEE transactions on computer-aided design of integrated circuits and systems Vol. 37; no. 7; pp. 1384 - 1395 | 
|---|---|
| Main Authors | , , , | 
| Format | Journal Article | 
| Language | English | 
| Published | 
            IEEE
    
        01.07.2018
     | 
| Subjects | |
| Online Access | Get full text | 
| ISSN | 0278-0070 1937-4151  | 
| DOI | 10.1109/TCAD.2017.2753201 | 
Cover
| Abstract | Due to the globalization trend of IC industry, more and more chips are designed and/or fabricated by foreign companies and foundries. Among all the consequences of this globalization trend, the possible existence of stealthy-inserted hardware Trojans (HTs) has raised a great security concern. Without the awareness of the end users or the original designers of host circuits, HTs are usually inserted stealthily at one of the outsourced design or fabrication stages, remain (almost) harmless to the host on dormant mode, and upon triggered will disturb the functions and/or leak the secrets carried by the host. It could become a serious security leak of the systems built on top of infected chips. Identifying whether a circuit carries an HT is thus of the utmost importance to mission-critical applications. Speaking from the point of HT designers, nets with extreme state probabilities could be used to create rare state combination for the purpose of HT triggering. Besides, HT designers seek nets with low switching probabilities to insert their HTs in order not to increase power leakage. We denote the nets with extreme state probability as extreme nets and the nets with low switching probability as inactive nets. It is commonly believed that in order to minimize the chance of accidental triggering or power analysis, they would be better to choose, among all the nets of the host, the nets that with extreme state probabilities (extreme nets) or the nets that barely switch (inactive nets) to construct the trigger parts of their HTs, respectively. However, a net of a circuit experiences very different state probabilities and switching probabilities on test mode and function mode, and existing works have only considered the former. The nets with low activeness on both test mode and function mode hence will be the "best candidates." In this paper we will first build the ground on finding the nets with low activeness on function mode, and then propose a fast heuristic method approach. The method runs in minimal complexity, has high accuracy, and is tested on popular benchmarks and large-sized circuits. | 
    
|---|---|
| AbstractList | Due to the globalization trend of IC industry, more and more chips are designed and/or fabricated by foreign companies and foundries. Among all the consequences of this globalization trend, the possible existence of stealthy-inserted hardware Trojans (HTs) has raised a great security concern. Without the awareness of the end users or the original designers of host circuits, HTs are usually inserted stealthily at one of the outsourced design or fabrication stages, remain (almost) harmless to the host on dormant mode, and upon triggered will disturb the functions and/or leak the secrets carried by the host. It could become a serious security leak of the systems built on top of infected chips. Identifying whether a circuit carries an HT is thus of the utmost importance to mission-critical applications. Speaking from the point of HT designers, nets with extreme state probabilities could be used to create rare state combination for the purpose of HT triggering. Besides, HT designers seek nets with low switching probabilities to insert their HTs in order not to increase power leakage. We denote the nets with extreme state probability as extreme nets and the nets with low switching probability as inactive nets. It is commonly believed that in order to minimize the chance of accidental triggering or power analysis, they would be better to choose, among all the nets of the host, the nets that with extreme state probabilities (extreme nets) or the nets that barely switch (inactive nets) to construct the trigger parts of their HTs, respectively. However, a net of a circuit experiences very different state probabilities and switching probabilities on test mode and function mode, and existing works have only considered the former. The nets with low activeness on both test mode and function mode hence will be the "best candidates." In this paper we will first build the ground on finding the nets with low activeness on function mode, and then propose a fast heuristic method approach. The method runs in minimal complexity, has high accuracy, and is tested on popular benchmarks and large-sized circuits. | 
    
| Author | Shi, Liang Cui, Xiaotong Zou, Minhui Wu, Kaijie  | 
    
| Author_xml | – sequence: 1 givenname: Minhui surname: Zou fullname: Zou, Minhui email: zouminhui@outlook.com organization: College of Computer Science, Chongqing University, Chongqing, 400044, China – sequence: 2 givenname: Xiaotong surname: Cui fullname: Cui, Xiaotong email: xiaotong.sd@gmail.com organization: College of Computer Science, Chongqing University, Chongqing, 400044, China – sequence: 3 givenname: Liang orcidid: 0000-0002-9977-529X surname: Shi fullname: Shi, Liang email: shiliang@cqu.edu.cn organization: College of Computer Science, Chongqing University, Chongqing, 400044, China – sequence: 4 givenname: Kaijie orcidid: 0000-0001-6127-8469 surname: Wu fullname: Wu, Kaijie email: kaijie@gmail.com organization: College of Computer Science, Chongqing University, Chongqing, 400044, China  | 
    
| BookMark | eNp9j01Lw0AQhhepYFv9AeIlfyB1Zj-yybG02goFPcRzmCSTsiUmslkQ_70JLR48eJqB932GeRZi1vUdC3GPsEKE7DHfrLcrCWhX0ho1LldijpmysUaDMzEHadMYwMKNWAzDCQC1kdlcwFsfuAuO2ij37nhkH205cBVc30VN76M9-fqLPI9xf6JuuBXXDbUD313mUrw_P-WbfXx43b1s1oe4kokJsSbFpZYmM8rq1JhSEicaiEiXtamQmxRrJauGkowQ1Zin2qZlzYbHmlJLYc93K98Pg-emqFyg6a3gybUFQjGJF5N4MYkXF_GRxD_kp3cf5L__ZR7OjGPm334KKpNSqh9GdGUv | 
    
| CODEN | ITCSDI | 
    
| CitedBy_id | crossref_primary_10_1109_TCSII_2021_3065292 crossref_primary_10_1109_TIFS_2019_2946044 crossref_primary_10_3390_electronics11244138 crossref_primary_10_1587_elex_16_20190431 crossref_primary_10_1109_TCAD_2021_3086765 crossref_primary_10_1007_s11276_023_03305_9 crossref_primary_10_1145_3446837 crossref_primary_10_1145_3545000 crossref_primary_10_1016_j_cose_2024_104111 crossref_primary_10_3390_mi15010149 crossref_primary_10_3390_jsan8030042  | 
    
| Cites_doi | 10.1109/IOLTS.2013.6604087 10.1109/MDT.2012.2196252 10.1109/MC.2010.369 10.1109/JPROC.2014.2335155 10.1109/JPROC.2014.2332154 10.1109/SP.2007.36 10.1109/HLDVT.2009.5340158 10.1109/MDT.2010.7 10.1007/978-981-4451-51-2 10.1109/TDSC.2004.25 10.1145/2463209.2488808 10.1109/HST.2009.5224971 10.1109/TDSC.2007.70215 10.1145/2660267.2660289 10.1145/2508859.2516654 10.1145/1558607.1558671 10.1109/TVLSI.2010.2093547  | 
    
| ContentType | Journal Article | 
    
| DBID | 97E RIA RIE AAYXX CITATION  | 
    
| DOI | 10.1109/TCAD.2017.2753201 | 
    
| DatabaseName | IEEE All-Society Periodicals Package (ASPP) 2005–Present IEEE All-Society Periodicals Package (ASPP) 1998–Present IEEE Electronic Library (IEL) CrossRef  | 
    
| DatabaseTitle | CrossRef | 
    
| DatabaseTitleList | |
| Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher  | 
    
| DeliveryMethod | fulltext_linktorsrc | 
    
| Discipline | Engineering | 
    
| EISSN | 1937-4151 | 
    
| EndPage | 1395 | 
    
| ExternalDocumentID | 10_1109_TCAD_2017_2753201 8039222  | 
    
| Genre | orig-research | 
    
| GrantInformation_xml | – fundername: NSFC grantid: 61772092 funderid: 10.13039/501100001809 – fundername: Fundamental Research Funds for the Central Universities grantid: 106112016CDJZR185512  | 
    
| GroupedDBID | --Z -~X 0R~ 29I 4.4 5GY 5VS 6IK 97E AAJGR AARMG AASAJ AAWTH ABAZT ABQJQ ABVLG ACGFS ACIWK ACNCT AENEX AETIX AGQYO AGSQL AHBIQ AI. AIBXA AKJIK AKQYR ALLEH ALMA_UNASSIGNED_HOLDINGS ASUFR ATWAV BEFXN BFFAM BGNUA BKEBE BPEOZ CS3 DU5 EBS EJD HZ~ H~9 IBMZZ ICLAB IFIPE IFJZH IPLJI JAVBF LAI M43 O9- OCL P2P PZZ RIA RIE RNS TN5 VH1 VJK AAYXX CITATION  | 
    
| ID | FETCH-LOGICAL-c265t-4a3eb42595374855b2ae640aaa4bd5c1ef81d32cfa69a113b2a8478bde5e40a33 | 
    
| IEDL.DBID | RIE | 
    
| ISSN | 0278-0070 | 
    
| IngestDate | Wed Oct 01 00:58:10 EDT 2025 Thu Apr 24 22:59:20 EDT 2025 Wed Aug 27 02:50:52 EDT 2025  | 
    
| IsPeerReviewed | true | 
    
| IsScholarly | true | 
    
| Issue | 7 | 
    
| Language | English | 
    
| License | https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html | 
    
| LinkModel | DirectLink | 
    
| MergedId | FETCHMERGED-LOGICAL-c265t-4a3eb42595374855b2ae640aaa4bd5c1ef81d32cfa69a113b2a8478bde5e40a33 | 
    
| ORCID | 0000-0001-6127-8469 0000-0002-9977-529X  | 
    
| PageCount | 12 | 
    
| ParticipantIDs | ieee_primary_8039222 crossref_citationtrail_10_1109_TCAD_2017_2753201 crossref_primary_10_1109_TCAD_2017_2753201  | 
    
| ProviderPackageCode | CITATION AAYXX  | 
    
| PublicationCentury | 2000 | 
    
| PublicationDate | 2018-July 2018-7-00  | 
    
| PublicationDateYYYYMMDD | 2018-07-01 | 
    
| PublicationDate_xml | – month: 07 year: 2018 text: 2018-July  | 
    
| PublicationDecade | 2010 | 
    
| PublicationTitle | IEEE transactions on computer-aided design of integrated circuits and systems | 
    
| PublicationTitleAbbrev | TCAD | 
    
| PublicationYear | 2018 | 
    
| Publisher | IEEE | 
    
| Publisher_xml | – name: IEEE | 
    
| References | ref13 ref12 alanazi (ref19) 2010; 2 ref14 ref20 ref11 atkinson (ref16) 1989 ref22 ref21 ref2 ref1 ref18 ref8 ref7 (ref17) 2016 ref9 ref4 ref3 cui (ref5) 2014 haider (ref23) 0 ref6 privault (ref15) 2013 li (ref10) 2008  | 
    
| References_xml | – ident: ref18 doi: 10.1109/IOLTS.2013.6604087 – year: 0 ident: ref23 article-title: Advancing the state-of-the-art in hardware Trojans detection publication-title: IEEE Trans Depend Secure Comput – ident: ref8 doi: 10.1109/MDT.2012.2196252 – ident: ref13 doi: 10.1109/MC.2010.369 – ident: ref14 doi: 10.1109/JPROC.2014.2335155 – ident: ref12 doi: 10.1109/JPROC.2014.2332154 – ident: ref9 doi: 10.1109/SP.2007.36 – ident: ref2 doi: 10.1109/HLDVT.2009.5340158 – ident: ref4 doi: 10.1109/MDT.2010.7 – year: 2016 ident: ref17 publication-title: ISCAS89 Sequential Benchmark Circuits – start-page: 1 year: 2014 ident: ref5 article-title: High-level synthesis for run-time hardware Trojan detection and recovery publication-title: Proc 51st ACM/EDAC/IEEE Design Autom Conf (DAC) – year: 2013 ident: ref15 publication-title: Understanding Markov chains examples and applications doi: 10.1007/978-981-4451-51-2 – ident: ref21 doi: 10.1109/TDSC.2004.25 – volume: 2 start-page: 152 year: 2010 ident: ref19 article-title: New comparative study between DES, 3DES and AES within nine factors publication-title: J Comput – ident: ref6 doi: 10.1145/2463209.2488808 – ident: ref3 doi: 10.1109/HST.2009.5224971 – ident: ref20 doi: 10.1109/TDSC.2007.70215 – year: 1989 ident: ref16 publication-title: An Introduction to Numerical Analysis – ident: ref22 doi: 10.1145/2660267.2660289 – start-page: 8 year: 2008 ident: ref10 article-title: At-speed delay characterization for IC authentication and Trojan horse detection publication-title: Proc IEEE Int Workshop Hardw -Oriented Security Trust (HOST) – ident: ref7 doi: 10.1145/2508859.2516654 – ident: ref1 doi: 10.1145/1558607.1558671 – ident: ref11 doi: 10.1109/TVLSI.2010.2093547  | 
    
| SSID | ssj0014529 | 
    
| Score | 2.3253922 | 
    
| Snippet | Due to the globalization trend of IC industry, more and more chips are designed and/or fabricated by foreign companies and foundries. Among all the... | 
    
| SourceID | crossref ieee  | 
    
| SourceType | Enrichment Source Index Database Publisher  | 
    
| StartPage | 1384 | 
    
| SubjectTerms | Fabrication Globalization Hardware Hardware Trojan (HT) nets activeness Registers state transition Switches total state Trojan horses  | 
    
| Title | Potential Trigger Detection for Hardware Trojans | 
    
| URI | https://ieeexplore.ieee.org/document/8039222 | 
    
| Volume | 37 | 
    
| hasFullText | 1 | 
    
| inHoldings | 1 | 
    
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVIEE databaseName: IEEE Electronic Library (IEL) customDbUrl: eissn: 1937-4151 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0014529 issn: 0278-0070 databaseCode: RIE dateStart: 19820101 isFulltext: true titleUrlDefault: https://ieeexplore.ieee.org/ providerName: IEEE  | 
    
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LS8NAEB5qT3rwVcX6IgdPYtJNNptkj6KWIlQ8tNBb2E2mgkojJUXw1zuTpEFFxFvIzsJmdjLf7M4L4IJMIIwlu90TFG4YxqQHSUO6hP251SJBpThRePwQjabh_UzNOnDV5sIgYhV8hh4_Vr78vMhWfFU2SASheUAKdyNOojpXq_UYsAOxuk_hirEkx40H0xd6MKGP4iCu2Ati7oPgf8OgL01VKkwZ7sB4vZo6lOTFW5XWyz5-FGr873J3YbsxLp3rWhr2oIOLfdj6UnKwB-KxKDlAiMgmdDB_wqVzi2UVj7VwyIB12JX_bpZIw8Uz4dgBTId3k5uR23RNcLMgUqUbGomW_kStuLKMUjYwGIXCGBPaXGU-zml_ZJDNTaSN70saJ4RKbI4KiUzKQ-guigUegSNkLDmFmw6JEQG90CI3ggxGo_25zSPdB7HmY5o1JcW5s8VrWh0thE6Z9SmzPm1Y34fLdspbXU_jL-Iec7UlbBh6_PvrE9ikOUkdS3sK3XK5wjOyGEp7XonKJyMhuSM | 
    
| linkProvider | IEEE | 
    
| linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3NS8MwFA9jHtSDX1Ocnz14EtulTdI2R1HH1G146GC3krRvgkoro0Pwr_el7coUEW-leYH05fX9XvK-CLlAEwgCZtzuIVCb8wD1IGpIG7E_1ZKGIIRJFB6N_cGEP0zFtEWumlwYACiDz8Axj6UvP82Thbkq64UU0dxDhbsmOOeiytZqfAbGhVjeqJiasSjJtQ_TpbIX4WeZMK7A8QLTCcH9hkIrbVVKVOlvk9FyPVUwyauzKLSTfP4o1fjfBe-Qrdq8tK4redglLcj2yOZK0cEOoU95YUKEkCzCo_kzzK1bKMqIrMxCE9YyzvwPNQcczl8QyfbJpH8X3Qzsum-CnXi-KGyuGGj8F6UwtWWE0J4Cn1OlFNepSFyY4Q4xL5kpXyrXZTiOGBXqFAQgGWMHpJ3lGRwSi7KAmSRuPCb6CPVU0lRRNBmVdGc69WWX0CUf46QuKm56W7zF5eGCytiwPjasj2vWd8llM-W9qqjxF3HHcLUhrBl69Pvrc7I-iEbDeHg_fjwmGzg_rCJrT0i7mC_gFO2HQp-VYvMFB528cA | 
    
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Potential+Trigger+Detection+for+Hardware+Trojans&rft.jtitle=IEEE+transactions+on+computer-aided+design+of+integrated+circuits+and+systems&rft.au=Zou%2C+Minhui&rft.au=Cui%2C+Xiaotong&rft.au=Shi%2C+Liang&rft.au=Wu%2C+Kaijie&rft.date=2018-07-01&rft.pub=IEEE&rft.issn=0278-0070&rft.volume=37&rft.issue=7&rft.spage=1384&rft.epage=1395&rft_id=info:doi/10.1109%2FTCAD.2017.2753201&rft.externalDocID=8039222 | 
    
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0278-0070&client=summon | 
    
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0278-0070&client=summon | 
    
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0278-0070&client=summon |