DocumentCode :
1768244
Title :
Applied formal methods for hardware Trojan detection
Author :
Rathmair, Michael ; Schupfer, Florian ; Krieg, Christian
Author_Institution :
Inst. of Comput. Technol., Vienna Univ. of Technol., Vienna, Austria
fYear :
2014
fDate :
1-5 June 2014
Firstpage :
169
Lastpage :
172
Abstract :
This paper addresses the potential danger using integrated circuits which contain malicious hardware modifications hidden in the silicon structure. A so called hardware Trojan may be added at several stages of the chip development process. This work concentrates on formal hardware Trojan detection during the design phase and highlights applied verification techniques. Selected methods are discussed and their combination used to increase an introduced “Trojan Assurance Level”.
Keywords :
electronic engineering computing; formal verification; integrated circuit design; invasive software; Trojan assurance level; chip development process; design phase; formal hardware Trojan detection; formal methods; integrated circuits; malicious hardware modifications; silicon structure; verification techniques; Data structures; Equations; Hardware; Mathematical model; Model checking; Trojan horses; Vectors;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Circuits and Systems (ISCAS), 2014 IEEE International Symposium on
Conference_Location :
Melbourne VIC
Print_ISBN :
978-1-4799-3431-7
Type :
conf
DOI :
10.1109/ISCAS.2014.6865092
Filename :
6865092
Link To Document :
بازگشت