Efficient Control-Flow Subgraph Matching for Detecting Hardware Trojans in RTL Models

Only few solutions for Hardware Trojan (HT) detection work at Register-Transfer Level (RTL), thus delaying the identification of possible security issues at lower abstraction levels of the design process. In addition, the most of existing approaches work only for specific kinds of HTs. To overcome t...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:ACM transactions on embedded computing systems 2017-10, Vol.16 (5s), p.1-19
Hauptverfasser: Piccolboni, Luca, Menon, Alessandro, Pravadelli, Graziano
Format: Artikel
Sprache:eng
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 19
container_issue 5s
container_start_page 1
container_title ACM transactions on embedded computing systems
container_volume 16
creator Piccolboni, Luca
Menon, Alessandro
Pravadelli, Graziano
description Only few solutions for Hardware Trojan (HT) detection work at Register-Transfer Level (RTL), thus delaying the identification of possible security issues at lower abstraction levels of the design process. In addition, the most of existing approaches work only for specific kinds of HTs. To overcome these limitations, we present a verification approach that detects different types of HTs in RTL models by exploiting an efficient control-flow subgraph matching algorithm. The prototypes of HTs that can be detected are modelled in a library by using Control-Flow Graphs (CFGs) that can be parametrised and extended to cover several variants of Trojan patterns. Experimental results show that our approach is effective and efficient in comparison with other state-of-the-art solutions.
doi_str_mv 10.1145/3126552
format Article
fullrecord <record><control><sourceid>crossref</sourceid><recordid>TN_cdi_crossref_primary_10_1145_3126552</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>10_1145_3126552</sourcerecordid><originalsourceid>FETCH-LOGICAL-c291t-3522604c56730939c186b1c6a3ddbf23d4df44f003043b641a9f484f29193a6e3</originalsourceid><addsrcrecordid>eNotkL1OwzAYRS0EEqUgXsEbU8D2ZzvxiEJLkVIhQTpHjn_aVCGubKOKt4eKTvfe4dzhIHRPySOlXDwBZVIIdoFmVIiqAC7F5amDKhSpymt0k9KeEFoyLmZos_B-MIObMq7DlGMYi-UYjvjzu99Gfdjhtc5mN0xb7EPELy47k09rpaM96uhwG8NeTwkPE_5oG7wO1o3pFl15PSZ3d8452iwXbb0qmvfXt_q5KQxTNBcgGJOEGyFLIAqUoZXsqZEarO09A8ut59wTAoRDLznVyvOK-z9YgZYO5ujh_9fEkFJ0vjvE4UvHn46S7mSjO9uAX8YmUAY</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>Efficient Control-Flow Subgraph Matching for Detecting Hardware Trojans in RTL Models</title><source>Access via ACM Digital Library</source><creator>Piccolboni, Luca ; Menon, Alessandro ; Pravadelli, Graziano</creator><creatorcontrib>Piccolboni, Luca ; Menon, Alessandro ; Pravadelli, Graziano</creatorcontrib><description>Only few solutions for Hardware Trojan (HT) detection work at Register-Transfer Level (RTL), thus delaying the identification of possible security issues at lower abstraction levels of the design process. In addition, the most of existing approaches work only for specific kinds of HTs. To overcome these limitations, we present a verification approach that detects different types of HTs in RTL models by exploiting an efficient control-flow subgraph matching algorithm. The prototypes of HTs that can be detected are modelled in a library by using Control-Flow Graphs (CFGs) that can be parametrised and extended to cover several variants of Trojan patterns. Experimental results show that our approach is effective and efficient in comparison with other state-of-the-art solutions.</description><identifier>ISSN: 1539-9087</identifier><identifier>EISSN: 1558-3465</identifier><identifier>DOI: 10.1145/3126552</identifier><language>eng</language><ispartof>ACM transactions on embedded computing systems, 2017-10, Vol.16 (5s), p.1-19</ispartof><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c291t-3522604c56730939c186b1c6a3ddbf23d4df44f003043b641a9f484f29193a6e3</citedby><cites>FETCH-LOGICAL-c291t-3522604c56730939c186b1c6a3ddbf23d4df44f003043b641a9f484f29193a6e3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784,27924,27925</link.rule.ids></links><search><creatorcontrib>Piccolboni, Luca</creatorcontrib><creatorcontrib>Menon, Alessandro</creatorcontrib><creatorcontrib>Pravadelli, Graziano</creatorcontrib><title>Efficient Control-Flow Subgraph Matching for Detecting Hardware Trojans in RTL Models</title><title>ACM transactions on embedded computing systems</title><description>Only few solutions for Hardware Trojan (HT) detection work at Register-Transfer Level (RTL), thus delaying the identification of possible security issues at lower abstraction levels of the design process. In addition, the most of existing approaches work only for specific kinds of HTs. To overcome these limitations, we present a verification approach that detects different types of HTs in RTL models by exploiting an efficient control-flow subgraph matching algorithm. The prototypes of HTs that can be detected are modelled in a library by using Control-Flow Graphs (CFGs) that can be parametrised and extended to cover several variants of Trojan patterns. Experimental results show that our approach is effective and efficient in comparison with other state-of-the-art solutions.</description><issn>1539-9087</issn><issn>1558-3465</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2017</creationdate><recordtype>article</recordtype><recordid>eNotkL1OwzAYRS0EEqUgXsEbU8D2ZzvxiEJLkVIhQTpHjn_aVCGubKOKt4eKTvfe4dzhIHRPySOlXDwBZVIIdoFmVIiqAC7F5amDKhSpymt0k9KeEFoyLmZos_B-MIObMq7DlGMYi-UYjvjzu99Gfdjhtc5mN0xb7EPELy47k09rpaM96uhwG8NeTwkPE_5oG7wO1o3pFl15PSZ3d8452iwXbb0qmvfXt_q5KQxTNBcgGJOEGyFLIAqUoZXsqZEarO09A8ut59wTAoRDLznVyvOK-z9YgZYO5ujh_9fEkFJ0vjvE4UvHn46S7mSjO9uAX8YmUAY</recordid><startdate>20171031</startdate><enddate>20171031</enddate><creator>Piccolboni, Luca</creator><creator>Menon, Alessandro</creator><creator>Pravadelli, Graziano</creator><scope>AAYXX</scope><scope>CITATION</scope></search><sort><creationdate>20171031</creationdate><title>Efficient Control-Flow Subgraph Matching for Detecting Hardware Trojans in RTL Models</title><author>Piccolboni, Luca ; Menon, Alessandro ; Pravadelli, Graziano</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c291t-3522604c56730939c186b1c6a3ddbf23d4df44f003043b641a9f484f29193a6e3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2017</creationdate><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Piccolboni, Luca</creatorcontrib><creatorcontrib>Menon, Alessandro</creatorcontrib><creatorcontrib>Pravadelli, Graziano</creatorcontrib><collection>CrossRef</collection><jtitle>ACM transactions on embedded computing systems</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Piccolboni, Luca</au><au>Menon, Alessandro</au><au>Pravadelli, Graziano</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Efficient Control-Flow Subgraph Matching for Detecting Hardware Trojans in RTL Models</atitle><jtitle>ACM transactions on embedded computing systems</jtitle><date>2017-10-31</date><risdate>2017</risdate><volume>16</volume><issue>5s</issue><spage>1</spage><epage>19</epage><pages>1-19</pages><issn>1539-9087</issn><eissn>1558-3465</eissn><abstract>Only few solutions for Hardware Trojan (HT) detection work at Register-Transfer Level (RTL), thus delaying the identification of possible security issues at lower abstraction levels of the design process. In addition, the most of existing approaches work only for specific kinds of HTs. To overcome these limitations, we present a verification approach that detects different types of HTs in RTL models by exploiting an efficient control-flow subgraph matching algorithm. The prototypes of HTs that can be detected are modelled in a library by using Control-Flow Graphs (CFGs) that can be parametrised and extended to cover several variants of Trojan patterns. Experimental results show that our approach is effective and efficient in comparison with other state-of-the-art solutions.</abstract><doi>10.1145/3126552</doi><tpages>19</tpages></addata></record>
fulltext fulltext
identifier ISSN: 1539-9087
ispartof ACM transactions on embedded computing systems, 2017-10, Vol.16 (5s), p.1-19
issn 1539-9087
1558-3465
language eng
recordid cdi_crossref_primary_10_1145_3126552
source Access via ACM Digital Library
title Efficient Control-Flow Subgraph Matching for Detecting Hardware Trojans in RTL Models
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-02T18%3A40%3A33IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-crossref&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Efficient%20Control-Flow%20Subgraph%20Matching%20for%20Detecting%20Hardware%20Trojans%20in%20RTL%20Models&rft.jtitle=ACM%20transactions%20on%20embedded%20computing%20systems&rft.au=Piccolboni,%20Luca&rft.date=2017-10-31&rft.volume=16&rft.issue=5s&rft.spage=1&rft.epage=19&rft.pages=1-19&rft.issn=1539-9087&rft.eissn=1558-3465&rft_id=info:doi/10.1145/3126552&rft_dat=%3Ccrossref%3E10_1145_3126552%3C/crossref%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true