Abstract
Hardware Trojan (HT) is a severe security threat during the development of an integrated circuit that can deviate the IC from its normal function and/or leak sensitive information during in-field operations. Trojans are often inserted during the fabrication phase, and to have Trojan-free ICs; it is highly desirable to detect them during post-silicon testing. Different test pattern generation-based HT detection techniques are reported in the literature to detect the Trojan during post-silicon testing. The existing methods provide low coverage and require a large number of test patterns. This paper proposes a new test pattern generation-based HT detection technique that provides high coverage while requiring less number of patterns. The proposed technique generates the optimal number of test patterns that activate the rare events by framing the problem as multi-objective optimization and solving it through a non-dominated sorting genetic algorithm (NSGA-II). The Trojans are mostly inserted using rare-triggered nodes (highly vulnerable, low controllable, and low observable). Thus, our technique applies the generated patterns during post-silicon testing to activate Trojans. Further, we also present the use of checker (detection) logic along with a proposed approach to effectively detect the Trojan during testing. The experimental evaluation on ISCAS benchmarks shows that the proposed technique provides 12 times higher trigger coverage with 1/3 fewer test patterns than the best-known existing genetic algorithm-based technique.
Similar content being viewed by others
Data Availability
This manuscript has no associated data.
References
Abdel-Basset M, Abdel-Fatah L, Sangaiah AK (2018) Chapter 10 - metaheuristic algorithms: A comprehensive review. In: Sangaiah AK, Sheng M, Zhang Z (eds) Computational Intelligence for Multimedia Big Data on the Cloud with Engineering Applications. Intelligent Data-Centric Systems. Academic Press, pp 185–231. [Online]. https://www.sciencedirect.com/science/article/pii/B9780128133149000104
Bhunia S, Abramovici M, Agrawal D, Bradley P, Hsiao MS, Plusquellic J, Tehranipoor M (2013) Protection against hardware trojan attacks: Towards a comprehensive solution. IEEE Design & Test 30(3):6–17
Bhunia S, Hsiao MS, Banga M, Narasimhan S (2014) Hardware trojan attacks: threat analysis and countermeasures. Proceeding of the IEEE 102(8):1229–1247
Chakraborty RS, Wolff F, Paul S, Papachristou C, Bhunia S (2009) Mero: a statistical approach for hardware trojan detection. In: Proceedings on Cryptographic Hardware and Embedded Systems-CHES 2009. Springer, pp 396–410
Chakraborty RS, Bhunia S (2011) Security against hardware trojan attacks using key-based design obfuscation. J Electron Test 27(6):767–785
Chakraborty RS, Pagliarini S, Mathew J, Rajendran SR, Devi MN (2017) A flexible online checking technique to enhance hardware trojan horse detectability by reliability analysis. IEEE Trans Emerg Top Comput 5(2):260–270
Cui X, Koopahi E, Wu K, Karri R (2018) Hardware trojan detection using the order of path delay. ACM Journal on Emerging Technologies in Computing Systems (JETC) 14(3):33
Dong C, Xu Y, Liu X, Zhang F, He G, Chen Y (2020) Hardware trojans in chips: a survey for detection and prevention. Sensors 20(18):5165
Dupuis S, Ba P-S, Di Natale G, Flottes M-L, Rouzeyre B (2014) A novel hardware logic encryption technique for thwarting illegal overproduction and hardware trojans. In: Proceedings on IEEE 20th International On-Line Testing Symposium (IOLTS). IEEE, pp 49–54
Goldstein LH, Thigpen EL (1980) Scoap: Sandia controllability/observability analysis program. In: Proceedings on 17th Design Automation Conference. pp 190–196
Haider SK, Jin C, Ahmad M, Shila DM, Khan O, van Dijk M (2014) Hatch: a formal framework of hardware Trojan design and detection. University of Connecticut Cryptology ePrint Archive Technical Report vol 943. p 2014
Hasegawa K, Oya M, Yanagisawa M, Togawa N (2016) Hardware trojans classification for gate-level netlists based on machine learning. In: Proceedings on 2016 IEEE 22nd International Symposium on On-Line Testing and Robust System Design (IOLTS). IEEE, pp 203–206
Hicks M, Finnicum M, King ST, Martin MM, Smith JM (2010) Overcoming an untrusted computing base: Detecting and removing malicious hardware automatically. In: Proceedings on IEEE Symposium onSecurity and Privacy (SP). IEEE, pp 159–172
Jin Y, Makris Y (2008) Hardware trojan detection using path delay fingerprint. In: Proceedings on IEEE International Workshop on Hardware-Oriented Security and Trust(HOST). IEEE, pp 51–57
Lin L, Burleson W, Paar C (2009) Moles: malicious off-chip leakage enabled by side-channels. In: Proceedings on International conference on computer-aided design. ACM, pp 117–122
Liu Y, He J, Ma H, Zhao Y (2020) Golden chip free trojan detection leveraging probabilistic neural network with genetic algorithm applied in the training phase. SCIENCE CHINA Inf Sci 63(2):1–3
Meyarivan T, Deb K, Pratap A, Agarwal S (2002) A fast and elitist multiobjective genetic algorithm: NSGA-II. IEEE Trans Evol Comput 6(2):182–197
Nourian M, Fazeli M, Hely D (2018) Hardware trojan detection using an advised genetic algorithm based logic testing. J Electron Test 34(4):461–470
Oya M, Shi Y, Yanagisawa M, Togawa N (2015) A score-based classification method for identifying hardware-trojans at gate-level netlists. In: Proceedings on Design, Automation & Test in Europe Conference & Exhibition. EDA Consortium, pp 465–470
Pan Z, Mishra P (2021) Automated test generation for hardware trojan detection using reinforcement learning. In: Proceedings on 26th Asia and South Pacific Design Automation Conference. pp 408–413
Rathor VS, Garg B, Sharma G (2017) New light weight threshold voltage defined camouflaged gates for trustworthy designs. J Electron Test 33(5):657–668
Rathor VS, Garg B, Sharma GK (2020) A novel low complexity logic encryption technique for design-for-trust. IEEE Trans Emerg Top Comput 8(3):688–699
Rostami M, Koushanfar F, Karri R (2014) A primer on hardware security: models, methods, and metrics. Proc IEEE 102(8):1283–1295
Saha S, Chakraborty RS, Nuthakki SS, Anshul, Mukhopadhyay D (2015) Improved test pattern generation for hardware trojan detection using genetic algorithm and Boolean satisfiability. In: Proceedings on International Workshop on Cryptographic Hardware and Embedded Systems. Springer, pp 577–596
Salmani H, Tehranipoor M, Plusquellic J (2012) A novel technique for improving hardware trojan detection and reducing trojan activation time. IEEE Trans Very Large Scale Integr VLSI Syst 20(1):112–125
Salmani H (2017) COTD: reference-free hardware trojan detection and recovery based on controllability and observability in gate-level netlist. IEEE Trans Inf Forensics Secur 12(2):338–350
Shekarian SMH, Zamani MS, Alami S (2013) Neutralizing a design-for-hardware-trust technique. In: Proceedings on 17th CSI International Symposium on Computer Architecture & Digital Systems (CADS 2013). IEEE, pp 73–78
Shi Z, Ma H, Zhang Q, Liu Y, Zhao Y, He J (2021) Test generation for hardware trojan detection using correlation analysis and genetic algorithm. ACM Transactions on Embedded Computing Systems (TECS) 20(4):1–20
Sturton C, Hicks M, Wagner D, King ST (2011) Defeating UCI: building stealthy and malicious hardware. In: Proceedings on IEEE Symposium on Security and Privacy (SP). IEEE, pp 64–77
Waksman A, Suozzo M, Sethumadhavan S (2013) Fanci: identification of stealthy malicious logic using Boolean functional analysis. In: Proceedings on ACM SIGSAC Conference on Computer & Communications Security. ACM, pp 697–708
Xiao K, Forte D, Jin Y, Karri R, Bhunia S, Tehranipoor M (2016) Hardware trojans: lessons learned after one decade of research. ACM Transactions on Design Automation of Electronic Systems (TODAES) 22(1):6
Xie X, Sun Y, Chen H, Ding Y (2017) Hardware trojans classification based on controllability and observability in gate-level netlist. IEICE Electronics Express 14(18):20170682–20170682
Zhang J, Yu H, Xu Q (2012) HtOutlier: hardware trojan detection with side-channel signature outlier identification. In: Proceedings on IEEE International Symposium on Hardware-Oriented Security and Trust. IEEE, pp 55–58
Zhang J, Yuan F, Xu Q (2014) Detrust: defeating hardware trust verification with stealthy implicitly-triggered hardware trojans. In: Proceedings on ACM SIGSAC Conference on Computer and Communications Security. ACM, pp 153–166
Zhang J, Yuan F, Wei L, Sun Z, Xu Q (2013) Veritrust: verification for hardware trust. In: Proceedings on 50th ACM/EDAC/IEEE Design Automation Conference (DAC). IEEE, pp 1–8
Zhang J, Yuan F, Wei L, Liu Y, Xu Q (2015) Veritrust: Verification for hardware trust. IEEE Trans Comput Aided Des Integr Circuits Syst 34(7):1148–1161
Zhou Z, Guin U, Agrawal VD (2018) Modeling and test generation for combinational hardware trojans. In: Proceedings on IEEE 36th VLSI Test Symposium (VTS). IEEE, pp 1–6
Acknowledgements
This research is supported by Data Security Council of India (DSCI) under the project titled “HT-Pred: A Complete Defensive Machine Learning Tool for Hardware Trojan Detection".
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of Interest
None.
Additional information
Responsible Editor: U. Guin
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Rathor, V.S., Singh, D., Singh, S. et al. Multi-Objective Optimization Based Test Pattern Generation for Hardware Trojan Detection. J Electron Test 39, 371–385 (2023). https://doi.org/10.1007/s10836-023-06071-w
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10836-023-06071-w