Potential Trigger Detection for Hardware Trojans

Due to the globalization trend of IC industry, more and more chips are designed and/or fabricated by foreign companies and foundries. Among all the consequences of this globalization trend, the possible existence of stealthy-inserted hardware Trojans (HTs) has raised a great security concern. Withou...

Full description

Saved in:
Bibliographic Details
Published inIEEE transactions on computer-aided design of integrated circuits and systems Vol. 37; no. 7; pp. 1384 - 1395
Main Authors Zou, Minhui, Cui, Xiaotong, Shi, Liang, Wu, Kaijie
Format Journal Article
LanguageEnglish
Published IEEE 01.07.2018
Subjects
Online AccessGet full text
ISSN0278-0070
1937-4151
DOI10.1109/TCAD.2017.2753201

Cover

Abstract Due to the globalization trend of IC industry, more and more chips are designed and/or fabricated by foreign companies and foundries. Among all the consequences of this globalization trend, the possible existence of stealthy-inserted hardware Trojans (HTs) has raised a great security concern. Without the awareness of the end users or the original designers of host circuits, HTs are usually inserted stealthily at one of the outsourced design or fabrication stages, remain (almost) harmless to the host on dormant mode, and upon triggered will disturb the functions and/or leak the secrets carried by the host. It could become a serious security leak of the systems built on top of infected chips. Identifying whether a circuit carries an HT is thus of the utmost importance to mission-critical applications. Speaking from the point of HT designers, nets with extreme state probabilities could be used to create rare state combination for the purpose of HT triggering. Besides, HT designers seek nets with low switching probabilities to insert their HTs in order not to increase power leakage. We denote the nets with extreme state probability as extreme nets and the nets with low switching probability as inactive nets. It is commonly believed that in order to minimize the chance of accidental triggering or power analysis, they would be better to choose, among all the nets of the host, the nets that with extreme state probabilities (extreme nets) or the nets that barely switch (inactive nets) to construct the trigger parts of their HTs, respectively. However, a net of a circuit experiences very different state probabilities and switching probabilities on test mode and function mode, and existing works have only considered the former. The nets with low activeness on both test mode and function mode hence will be the "best candidates." In this paper we will first build the ground on finding the nets with low activeness on function mode, and then propose a fast heuristic method approach. The method runs in minimal complexity, has high accuracy, and is tested on popular benchmarks and large-sized circuits.
AbstractList Due to the globalization trend of IC industry, more and more chips are designed and/or fabricated by foreign companies and foundries. Among all the consequences of this globalization trend, the possible existence of stealthy-inserted hardware Trojans (HTs) has raised a great security concern. Without the awareness of the end users or the original designers of host circuits, HTs are usually inserted stealthily at one of the outsourced design or fabrication stages, remain (almost) harmless to the host on dormant mode, and upon triggered will disturb the functions and/or leak the secrets carried by the host. It could become a serious security leak of the systems built on top of infected chips. Identifying whether a circuit carries an HT is thus of the utmost importance to mission-critical applications. Speaking from the point of HT designers, nets with extreme state probabilities could be used to create rare state combination for the purpose of HT triggering. Besides, HT designers seek nets with low switching probabilities to insert their HTs in order not to increase power leakage. We denote the nets with extreme state probability as extreme nets and the nets with low switching probability as inactive nets. It is commonly believed that in order to minimize the chance of accidental triggering or power analysis, they would be better to choose, among all the nets of the host, the nets that with extreme state probabilities (extreme nets) or the nets that barely switch (inactive nets) to construct the trigger parts of their HTs, respectively. However, a net of a circuit experiences very different state probabilities and switching probabilities on test mode and function mode, and existing works have only considered the former. The nets with low activeness on both test mode and function mode hence will be the "best candidates." In this paper we will first build the ground on finding the nets with low activeness on function mode, and then propose a fast heuristic method approach. The method runs in minimal complexity, has high accuracy, and is tested on popular benchmarks and large-sized circuits.
Author Shi, Liang
Cui, Xiaotong
Zou, Minhui
Wu, Kaijie
Author_xml – sequence: 1
  givenname: Minhui
  surname: Zou
  fullname: Zou, Minhui
  email: zouminhui@outlook.com
  organization: College of Computer Science, Chongqing University, Chongqing, 400044, China
– sequence: 2
  givenname: Xiaotong
  surname: Cui
  fullname: Cui, Xiaotong
  email: xiaotong.sd@gmail.com
  organization: College of Computer Science, Chongqing University, Chongqing, 400044, China
– sequence: 3
  givenname: Liang
  orcidid: 0000-0002-9977-529X
  surname: Shi
  fullname: Shi, Liang
  email: shiliang@cqu.edu.cn
  organization: College of Computer Science, Chongqing University, Chongqing, 400044, China
– sequence: 4
  givenname: Kaijie
  orcidid: 0000-0001-6127-8469
  surname: Wu
  fullname: Wu, Kaijie
  email: kaijie@gmail.com
  organization: College of Computer Science, Chongqing University, Chongqing, 400044, China
BookMark eNp9j01Lw0AQhhepYFv9AeIlfyB1Zj-yybG02goFPcRzmCSTsiUmslkQ_70JLR48eJqB932GeRZi1vUdC3GPsEKE7DHfrLcrCWhX0ho1LldijpmysUaDMzEHadMYwMKNWAzDCQC1kdlcwFsfuAuO2ij37nhkH205cBVc30VN76M9-fqLPI9xf6JuuBXXDbUD313mUrw_P-WbfXx43b1s1oe4kokJsSbFpZYmM8rq1JhSEicaiEiXtamQmxRrJauGkowQ1Zin2qZlzYbHmlJLYc93K98Pg-emqFyg6a3gybUFQjGJF5N4MYkXF_GRxD_kp3cf5L__ZR7OjGPm334KKpNSqh9GdGUv
CODEN ITCSDI
CitedBy_id crossref_primary_10_1109_TCSII_2021_3065292
crossref_primary_10_1109_TIFS_2019_2946044
crossref_primary_10_3390_electronics11244138
crossref_primary_10_1587_elex_16_20190431
crossref_primary_10_1109_TCAD_2021_3086765
crossref_primary_10_1007_s11276_023_03305_9
crossref_primary_10_1145_3446837
crossref_primary_10_1145_3545000
crossref_primary_10_1016_j_cose_2024_104111
crossref_primary_10_3390_mi15010149
crossref_primary_10_3390_jsan8030042
Cites_doi 10.1109/IOLTS.2013.6604087
10.1109/MDT.2012.2196252
10.1109/MC.2010.369
10.1109/JPROC.2014.2335155
10.1109/JPROC.2014.2332154
10.1109/SP.2007.36
10.1109/HLDVT.2009.5340158
10.1109/MDT.2010.7
10.1007/978-981-4451-51-2
10.1109/TDSC.2004.25
10.1145/2463209.2488808
10.1109/HST.2009.5224971
10.1109/TDSC.2007.70215
10.1145/2660267.2660289
10.1145/2508859.2516654
10.1145/1558607.1558671
10.1109/TVLSI.2010.2093547
ContentType Journal Article
DBID 97E
RIA
RIE
AAYXX
CITATION
DOI 10.1109/TCAD.2017.2753201
DatabaseName IEEE All-Society Periodicals Package (ASPP) 2005–Present
IEEE All-Society Periodicals Package (ASPP) 1998–Present
IEEE Electronic Library (IEL)
CrossRef
DatabaseTitle CrossRef
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 1937-4151
EndPage 1395
ExternalDocumentID 10_1109_TCAD_2017_2753201
8039222
Genre orig-research
GrantInformation_xml – fundername: NSFC
  grantid: 61772092
  funderid: 10.13039/501100001809
– fundername: Fundamental Research Funds for the Central Universities
  grantid: 106112016CDJZR185512
GroupedDBID --Z
-~X
0R~
29I
4.4
5GY
5VS
6IK
97E
AAJGR
AARMG
AASAJ
AAWTH
ABAZT
ABQJQ
ABVLG
ACGFS
ACIWK
ACNCT
AENEX
AETIX
AGQYO
AGSQL
AHBIQ
AI.
AIBXA
AKJIK
AKQYR
ALLEH
ALMA_UNASSIGNED_HOLDINGS
ASUFR
ATWAV
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CS3
DU5
EBS
EJD
HZ~
H~9
IBMZZ
ICLAB
IFIPE
IFJZH
IPLJI
JAVBF
LAI
M43
O9-
OCL
P2P
PZZ
RIA
RIE
RNS
TN5
VH1
VJK
AAYXX
CITATION
ID FETCH-LOGICAL-c265t-4a3eb42595374855b2ae640aaa4bd5c1ef81d32cfa69a113b2a8478bde5e40a33
IEDL.DBID RIE
ISSN 0278-0070
IngestDate Wed Oct 01 00:58:10 EDT 2025
Thu Apr 24 22:59:20 EDT 2025
Wed Aug 27 02:50:52 EDT 2025
IsPeerReviewed true
IsScholarly true
Issue 7
Language English
License https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c265t-4a3eb42595374855b2ae640aaa4bd5c1ef81d32cfa69a113b2a8478bde5e40a33
ORCID 0000-0001-6127-8469
0000-0002-9977-529X
PageCount 12
ParticipantIDs ieee_primary_8039222
crossref_citationtrail_10_1109_TCAD_2017_2753201
crossref_primary_10_1109_TCAD_2017_2753201
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2018-July
2018-7-00
PublicationDateYYYYMMDD 2018-07-01
PublicationDate_xml – month: 07
  year: 2018
  text: 2018-July
PublicationDecade 2010
PublicationTitle IEEE transactions on computer-aided design of integrated circuits and systems
PublicationTitleAbbrev TCAD
PublicationYear 2018
Publisher IEEE
Publisher_xml – name: IEEE
References ref13
ref12
alanazi (ref19) 2010; 2
ref14
ref20
ref11
atkinson (ref16) 1989
ref22
ref21
ref2
ref1
ref18
ref8
ref7
(ref17) 2016
ref9
ref4
ref3
cui (ref5) 2014
haider (ref23) 0
ref6
privault (ref15) 2013
li (ref10) 2008
References_xml – ident: ref18
  doi: 10.1109/IOLTS.2013.6604087
– year: 0
  ident: ref23
  article-title: Advancing the state-of-the-art in hardware Trojans detection
  publication-title: IEEE Trans Depend Secure Comput
– ident: ref8
  doi: 10.1109/MDT.2012.2196252
– ident: ref13
  doi: 10.1109/MC.2010.369
– ident: ref14
  doi: 10.1109/JPROC.2014.2335155
– ident: ref12
  doi: 10.1109/JPROC.2014.2332154
– ident: ref9
  doi: 10.1109/SP.2007.36
– ident: ref2
  doi: 10.1109/HLDVT.2009.5340158
– ident: ref4
  doi: 10.1109/MDT.2010.7
– year: 2016
  ident: ref17
  publication-title: ISCAS89 Sequential Benchmark Circuits
– start-page: 1
  year: 2014
  ident: ref5
  article-title: High-level synthesis for run-time hardware Trojan detection and recovery
  publication-title: Proc 51st ACM/EDAC/IEEE Design Autom Conf (DAC)
– year: 2013
  ident: ref15
  publication-title: Understanding Markov chains examples and applications
  doi: 10.1007/978-981-4451-51-2
– ident: ref21
  doi: 10.1109/TDSC.2004.25
– volume: 2
  start-page: 152
  year: 2010
  ident: ref19
  article-title: New comparative study between DES, 3DES and AES within nine factors
  publication-title: J Comput
– ident: ref6
  doi: 10.1145/2463209.2488808
– ident: ref3
  doi: 10.1109/HST.2009.5224971
– ident: ref20
  doi: 10.1109/TDSC.2007.70215
– year: 1989
  ident: ref16
  publication-title: An Introduction to Numerical Analysis
– ident: ref22
  doi: 10.1145/2660267.2660289
– start-page: 8
  year: 2008
  ident: ref10
  article-title: At-speed delay characterization for IC authentication and Trojan horse detection
  publication-title: Proc IEEE Int Workshop Hardw -Oriented Security Trust (HOST)
– ident: ref7
  doi: 10.1145/2508859.2516654
– ident: ref1
  doi: 10.1145/1558607.1558671
– ident: ref11
  doi: 10.1109/TVLSI.2010.2093547
SSID ssj0014529
Score 2.3253922
Snippet Due to the globalization trend of IC industry, more and more chips are designed and/or fabricated by foreign companies and foundries. Among all the...
SourceID crossref
ieee
SourceType Enrichment Source
Index Database
Publisher
StartPage 1384
SubjectTerms Fabrication
Globalization
Hardware
Hardware Trojan (HT)
nets activeness
Registers
state transition
Switches
total state
Trojan horses
Title Potential Trigger Detection for Hardware Trojans
URI https://ieeexplore.ieee.org/document/8039222
Volume 37
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVIEE
  databaseName: IEEE Electronic Library (IEL)
  customDbUrl:
  eissn: 1937-4151
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0014529
  issn: 0278-0070
  databaseCode: RIE
  dateStart: 19820101
  isFulltext: true
  titleUrlDefault: https://ieeexplore.ieee.org/
  providerName: IEEE
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LS8NAEB5qT3rwVcX6IgdPYtJNNptkj6KWIlQ8tNBb2E2mgkojJUXw1zuTpEFFxFvIzsJmdjLf7M4L4IJMIIwlu90TFG4YxqQHSUO6hP251SJBpThRePwQjabh_UzNOnDV5sIgYhV8hh4_Vr78vMhWfFU2SASheUAKdyNOojpXq_UYsAOxuk_hirEkx40H0xd6MKGP4iCu2Ati7oPgf8OgL01VKkwZ7sB4vZo6lOTFW5XWyz5-FGr873J3YbsxLp3rWhr2oIOLfdj6UnKwB-KxKDlAiMgmdDB_wqVzi2UVj7VwyIB12JX_bpZIw8Uz4dgBTId3k5uR23RNcLMgUqUbGomW_kStuLKMUjYwGIXCGBPaXGU-zml_ZJDNTaSN70saJ4RKbI4KiUzKQ-guigUegSNkLDmFmw6JEQG90CI3ggxGo_25zSPdB7HmY5o1JcW5s8VrWh0thE6Z9SmzPm1Y34fLdspbXU_jL-Iec7UlbBh6_PvrE9ikOUkdS3sK3XK5wjOyGEp7XonKJyMhuSM
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3NS8MwFA9jHtSDX1Ocnz14EtulTdI2R1HH1G146GC3krRvgkoro0Pwr_el7coUEW-leYH05fX9XvK-CLlAEwgCZtzuIVCb8wD1IGpIG7E_1ZKGIIRJFB6N_cGEP0zFtEWumlwYACiDz8Axj6UvP82Thbkq64UU0dxDhbsmOOeiytZqfAbGhVjeqJiasSjJtQ_TpbIX4WeZMK7A8QLTCcH9hkIrbVVKVOlvk9FyPVUwyauzKLSTfP4o1fjfBe-Qrdq8tK4redglLcj2yOZK0cEOoU95YUKEkCzCo_kzzK1bKMqIrMxCE9YyzvwPNQcczl8QyfbJpH8X3Qzsum-CnXi-KGyuGGj8F6UwtWWE0J4Cn1OlFNepSFyY4Q4xL5kpXyrXZTiOGBXqFAQgGWMHpJ3lGRwSi7KAmSRuPCb6CPVU0lRRNBmVdGc69WWX0CUf46QuKm56W7zF5eGCytiwPjasj2vWd8llM-W9qqjxF3HHcLUhrBl69Pvrc7I-iEbDeHg_fjwmGzg_rCJrT0i7mC_gFO2HQp-VYvMFB528cA
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Potential+Trigger+Detection+for+Hardware+Trojans&rft.jtitle=IEEE+transactions+on+computer-aided+design+of+integrated+circuits+and+systems&rft.au=Zou%2C+Minhui&rft.au=Cui%2C+Xiaotong&rft.au=Shi%2C+Liang&rft.au=Wu%2C+Kaijie&rft.date=2018-07-01&rft.pub=IEEE&rft.issn=0278-0070&rft.volume=37&rft.issue=7&rft.spage=1384&rft.epage=1395&rft_id=info:doi/10.1109%2FTCAD.2017.2753201&rft.externalDocID=8039222
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0278-0070&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0278-0070&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0278-0070&client=summon