DocumentCode
3308187
Title
Ensuring trust of third-party hardware design with constrained sequential equivalence checking
Author
Shrestha, G. ; Hsiao, Michael S.
Author_Institution
Bradley Dept. of Electr. & Comput. Eng., Virginia Tech, Blacksburg, VA, USA
fYear
2012
fDate
13-15 Nov. 2012
Firstpage
7
Lastpage
12
Abstract
Globalization of semiconductor design and manufacturing has led to a concern of trust in the final product. The effect of any modifications made by an adversary can be catastrophic in critical applications. Because of the stealthy nature of such insertions, it is extremely difficult to detect them using traditional testing and verification methods. In this paper, we propose a novel technique for detection of malicious alteration(s) in a third party soft intellectual property (IP) using a clever combination of sequential equivalence checking (SEC) and test generation. The use of powerful inductive invariants can prune a large illegal state space, and test generation helps to provide a sensitization path for nodes of interest. Results for a set of hard-to-verify designs show that our method can either ensure that the suspect design is free from the functional effect of any malicious change(s) or return a small group of most likely malicious signals.
Keywords
industrial property; semiconductor device manufacture; IP; SEC; catastrophic; clever combination; constrained sequential equivalence checking; hard-to-verify designs; illegal state space; powerful inductive invariants; semiconductor design; sequential equivalence checking; test generation; third party soft intellectual property; third-party hardware design; Automatic test pattern generation; Benchmark testing; Circuit faults; Integrated circuit modeling; Logic gates; Trojan horses; Vectors;
fLanguage
English
Publisher
ieee
Conference_Titel
Homeland Security (HST), 2012 IEEE Conference on Technologies for
Conference_Location
Waltham, MA
Print_ISBN
978-1-4673-2708-4
Type
conf
DOI
10.1109/THS.2012.6459818
Filename
6459818
Link To Document