Detecting Hardware Trojans with Gate-Level Information-Flow Tracking

Abstract

A method based on information-flow tracking uses gate-level logic to detect hardware Trojans that violate the confidentiality and integrity properties of third-party IP cores. Experiments on trust-HUB benchmarks show that the method reveals Trojan behavior and unintentional design vulnerabilities that functional testing cannot pinpoint.

DOI: 10.1109/MC.2016.225

5 Figures and Tables

Cite this paper

@article{Hu2016DetectingHT, title={Detecting Hardware Trojans with Gate-Level Information-Flow Tracking}, author={Wei Hu and Baolei Mao and Jason Oberg and Ryan Kastner}, journal={Computer}, year={2016}, volume={49}, pages={44-52} }