Skip to main content

Advertisement

Log in

Multi-Objective Optimization Based Test Pattern Generation for Hardware Trojan Detection

  • Published:
Journal of Electronic Testing Aims and scope Submit manuscript

Abstract

Hardware Trojan (HT) is a severe security threat during the development of an integrated circuit that can deviate the IC from its normal function and/or leak sensitive information during in-field operations. Trojans are often inserted during the fabrication phase, and to have Trojan-free ICs; it is highly desirable to detect them during post-silicon testing. Different test pattern generation-based HT detection techniques are reported in the literature to detect the Trojan during post-silicon testing. The existing methods provide low coverage and require a large number of test patterns. This paper proposes a new test pattern generation-based HT detection technique that provides high coverage while requiring less number of patterns. The proposed technique generates the optimal number of test patterns that activate the rare events by framing the problem as multi-objective optimization and solving it through a non-dominated sorting genetic algorithm (NSGA-II). The Trojans are mostly inserted using rare-triggered nodes (highly vulnerable, low controllable, and low observable). Thus, our technique applies the generated patterns during post-silicon testing to activate Trojans. Further, we also present the use of checker (detection) logic along with a proposed approach to effectively detect the Trojan during testing. The experimental evaluation on ISCAS benchmarks shows that the proposed technique provides 12 times higher trigger coverage with 1/3 fewer test patterns than the best-known existing genetic algorithm-based technique.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

Data Availability

This manuscript has no associated data.

References

  1. Abdel-Basset M, Abdel-Fatah L, Sangaiah AK (2018) Chapter 10 - metaheuristic algorithms: A comprehensive review. In: Sangaiah AK, Sheng M, Zhang Z (eds) Computational Intelligence for Multimedia Big Data on the Cloud with Engineering Applications. Intelligent Data-Centric Systems. Academic Press, pp 185–231. [Online]. https://www.sciencedirect.com/science/article/pii/B9780128133149000104

  2. Bhunia S, Abramovici M, Agrawal D, Bradley P, Hsiao MS, Plusquellic J, Tehranipoor M (2013) Protection against hardware trojan attacks: Towards a comprehensive solution. IEEE Design & Test 30(3):6–17

    Article  Google Scholar 

  3. Bhunia S, Hsiao MS, Banga M, Narasimhan S (2014) Hardware trojan attacks: threat analysis and countermeasures. Proceeding of the IEEE 102(8):1229–1247

    Article  Google Scholar 

  4. Chakraborty RS, Wolff F, Paul S, Papachristou C, Bhunia S (2009) Mero: a statistical approach for hardware trojan detection. In: Proceedings on Cryptographic Hardware and Embedded Systems-CHES 2009. Springer, pp 396–410

  5. Chakraborty RS, Bhunia S (2011) Security against hardware trojan attacks using key-based design obfuscation. J Electron Test 27(6):767–785

    Article  Google Scholar 

  6. Chakraborty RS, Pagliarini S, Mathew J, Rajendran SR, Devi MN (2017) A flexible online checking technique to enhance hardware trojan horse detectability by reliability analysis. IEEE Trans Emerg Top Comput 5(2):260–270

    Article  Google Scholar 

  7. Cui X, Koopahi E, Wu K, Karri R (2018) Hardware trojan detection using the order of path delay. ACM Journal on Emerging Technologies in Computing Systems (JETC) 14(3):33

    Google Scholar 

  8. Dong C, Xu Y, Liu X, Zhang F, He G, Chen Y (2020) Hardware trojans in chips: a survey for detection and prevention. Sensors 20(18):5165

    Article  Google Scholar 

  9. Dupuis S, Ba P-S, Di Natale G, Flottes M-L, Rouzeyre B (2014) A novel hardware logic encryption technique for thwarting illegal overproduction and hardware trojans. In: Proceedings on IEEE 20th International On-Line Testing Symposium (IOLTS). IEEE, pp 49–54

  10. Goldstein LH, Thigpen EL (1980) Scoap: Sandia controllability/observability analysis program. In: Proceedings on 17th Design Automation Conference. pp 190–196

  11. Haider SK, Jin C, Ahmad M, Shila DM, Khan O, van Dijk M (2014) Hatch: a formal framework of hardware Trojan design and detection. University of Connecticut Cryptology ePrint Archive Technical Report vol 943. p 2014

  12. Hasegawa K, Oya M, Yanagisawa M, Togawa N (2016) Hardware trojans classification for gate-level netlists based on machine learning. In: Proceedings on 2016 IEEE 22nd International Symposium on On-Line Testing and Robust System Design (IOLTS). IEEE, pp 203–206

  13. Hicks M, Finnicum M, King ST, Martin MM, Smith JM (2010) Overcoming an untrusted computing base: Detecting and removing malicious hardware automatically. In: Proceedings on IEEE Symposium onSecurity and Privacy (SP). IEEE, pp 159–172

  14. Jin Y, Makris Y (2008) Hardware trojan detection using path delay fingerprint. In: Proceedings on IEEE International Workshop on Hardware-Oriented Security and Trust(HOST). IEEE, pp 51–57

  15. Lin L, Burleson W, Paar C (2009) Moles: malicious off-chip leakage enabled by side-channels. In: Proceedings on International conference on computer-aided design. ACM, pp 117–122

  16. Liu Y, He J, Ma H, Zhao Y (2020) Golden chip free trojan detection leveraging probabilistic neural network with genetic algorithm applied in the training phase. SCIENCE CHINA Inf Sci 63(2):1–3

    Article  Google Scholar 

  17. Meyarivan T, Deb K, Pratap A, Agarwal S (2002) A fast and elitist multiobjective genetic algorithm: NSGA-II. IEEE Trans Evol Comput 6(2):182–197

    Article  Google Scholar 

  18. Nourian M, Fazeli M, Hely D (2018) Hardware trojan detection using an advised genetic algorithm based logic testing. J Electron Test 34(4):461–470

    Article  Google Scholar 

  19. Oya M, Shi Y, Yanagisawa M, Togawa N (2015) A score-based classification method for identifying hardware-trojans at gate-level netlists. In: Proceedings on Design, Automation & Test in Europe Conference & Exhibition. EDA Consortium, pp 465–470

  20. Pan Z, Mishra P (2021) Automated test generation for hardware trojan detection using reinforcement learning. In: Proceedings on 26th Asia and South Pacific Design Automation Conference. pp 408–413

  21. Rathor VS, Garg B, Sharma G (2017) New light weight threshold voltage defined camouflaged gates for trustworthy designs. J Electron Test 33(5):657–668

    Article  Google Scholar 

  22. Rathor VS, Garg B, Sharma GK (2020) A novel low complexity logic encryption technique for design-for-trust. IEEE Trans Emerg Top Comput 8(3):688–699

    Article  Google Scholar 

  23. Rostami M, Koushanfar F, Karri R (2014) A primer on hardware security: models, methods, and metrics. Proc IEEE 102(8):1283–1295

    Article  Google Scholar 

  24. Saha S, Chakraborty RS, Nuthakki SS, Anshul, Mukhopadhyay D (2015) Improved test pattern generation for hardware trojan detection using genetic algorithm and Boolean satisfiability. In: Proceedings on International Workshop on Cryptographic Hardware and Embedded Systems. Springer, pp 577–596

  25. Salmani H, Tehranipoor M, Plusquellic J (2012) A novel technique for improving hardware trojan detection and reducing trojan activation time. IEEE Trans Very Large Scale Integr VLSI Syst 20(1):112–125

  26. Salmani H (2017) COTD: reference-free hardware trojan detection and recovery based on controllability and observability in gate-level netlist. IEEE Trans Inf Forensics Secur 12(2):338–350

    Article  Google Scholar 

  27. Shekarian SMH, Zamani MS, Alami S (2013) Neutralizing a design-for-hardware-trust technique. In: Proceedings on 17th CSI International Symposium on Computer Architecture & Digital Systems (CADS 2013). IEEE, pp 73–78

  28. Shi Z, Ma H, Zhang Q, Liu Y, Zhao Y, He J (2021) Test generation for hardware trojan detection using correlation analysis and genetic algorithm. ACM Transactions on Embedded Computing Systems (TECS) 20(4):1–20

    Article  Google Scholar 

  29. Sturton C, Hicks M, Wagner D, King ST (2011) Defeating UCI: building stealthy and malicious hardware. In: Proceedings on IEEE Symposium on Security and Privacy (SP). IEEE, pp 64–77

  30. Waksman A, Suozzo M, Sethumadhavan S (2013) Fanci: identification of stealthy malicious logic using Boolean functional analysis. In: Proceedings on ACM SIGSAC Conference on Computer & Communications Security. ACM, pp 697–708

  31. Xiao K, Forte D, Jin Y, Karri R, Bhunia S, Tehranipoor M (2016) Hardware trojans: lessons learned after one decade of research. ACM Transactions on Design Automation of Electronic Systems (TODAES) 22(1):6

    Google Scholar 

  32. Xie X, Sun Y, Chen H, Ding Y (2017) Hardware trojans classification based on controllability and observability in gate-level netlist. IEICE Electronics Express 14(18):20170682–20170682

    Article  Google Scholar 

  33. Zhang J, Yu H, Xu Q (2012) HtOutlier: hardware trojan detection with side-channel signature outlier identification. In: Proceedings on IEEE International Symposium on Hardware-Oriented Security and Trust. IEEE, pp 55–58

  34. Zhang J, Yuan F, Xu Q (2014) Detrust: defeating hardware trust verification with stealthy implicitly-triggered hardware trojans. In: Proceedings on ACM SIGSAC Conference on Computer and Communications Security. ACM, pp 153–166

  35. Zhang J, Yuan F, Wei L, Sun Z, Xu Q (2013) Veritrust: verification for hardware trust. In: Proceedings on 50th ACM/EDAC/IEEE Design Automation Conference (DAC). IEEE, pp 1–8

  36. Zhang J, Yuan F, Wei L, Liu Y, Xu Q (2015) Veritrust: Verification for hardware trust. IEEE Trans Comput Aided Des Integr Circuits Syst 34(7):1148–1161

    Article  Google Scholar 

  37. Zhou Z, Guin U, Agrawal VD (2018) Modeling and test generation for combinational hardware trojans. In: Proceedings on IEEE 36th VLSI Test Symposium (VTS). IEEE, pp 1–6

Download references

Acknowledgements

This research is supported by Data Security Council of India (DSCI) under the project titled “HT-Pred: A Complete Defensive Machine Learning Tool for Hardware Trojan Detection".

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Vijaypal Singh Rathor.

Ethics declarations

Conflict of Interest

None.

Additional information

Responsible Editor: U. Guin

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Rathor, V.S., Singh, D., Singh, S. et al. Multi-Objective Optimization Based Test Pattern Generation for Hardware Trojan Detection. J Electron Test 39, 371–385 (2023). https://doi.org/10.1007/s10836-023-06071-w

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10836-023-06071-w

Keywords

Navigation