Property Coverage Analysis Based Trustworthiness Verification for Potential Threats from EDA Tools

Trustworthiness of a hardware design has caused great concerns, including the malicious modifications on the design made by Electrical Design Automation (EDA) tools of third-party. In this paper, a novel hardware Trojan (HT) detection method based on the property coverage analysis is proposed to verify the synthesized netlist. The proposed method is motivated by the observation that the malicious modification on the design would threaten the predesigned properties, either by invalidating the properties or by lowering their state coverage, which can be verified by model checking in principle. The proposed method has generality and can be applied to a variety of hardware Trojans. With HTs inserted in the netlists, the experimental results show the proposed method can detect the malicious Trojans effectively.

[1]  Tiziano Villa,et al.  VIS: A System for Verification and Synthesis , 1996, CAV.

[2]  Prabhat Mishra,et al.  Pre-silicon security verification and validation: A formal perspective , 2015, 2015 52nd ACM/EDAC/IEEE Design Automation Conference (DAC).

[3]  Yiorgos Makris,et al.  Proof-Carrying Hardware Intellectual Property: A Pathway to Trusted Module Acquisition , 2012, IEEE Transactions on Information Forensics and Security.

[4]  Timothy Kam,et al.  Coverage estimation for symbolic model checking , 1999, DAC '99.

[5]  Milo M. K. Martin,et al.  Overcoming an Untrusted Computing Base: Detecting and Removing Malicious Hardware Automatically , 2010, 2010 IEEE Symposium on Security and Privacy.

[6]  Farinaz Koushanfar,et al.  A Survey of Hardware Trojan Taxonomy and Detection , 2010, IEEE Design & Test of Computers.

[7]  Tao Xie,et al.  Automatic Extraction of Abstract-Object-State Machines Based on Branch Coverage , 2005 .

[8]  Mark Mohammad Tehranipoor,et al.  Case study: Detecting hardware Trojans in third-party digital IP cores , 2011, 2011 IEEE International Symposium on Hardware-Oriented Security and Trust.

[9]  Yier Jin EDA tools trust evaluation through security property proofs , 2014, 2014 Design, Automation & Test in Europe Conference & Exhibition (DATE).

[10]  Gang Qu,et al.  Designing Trusted Embedded Systems from Finite State Machines , 2014, TECS.

[11]  Yuanyuan Zhou,et al.  Designing and Implementing Malicious Hardware , 2008, LEET.

[12]  David A. Wagner,et al.  Defeating UCI: Building Stealthy and Malicious Hardware , 2011, 2011 IEEE Symposium on Security and Privacy.

[13]  Florian Schupfer,et al.  Hardware Trojan detection by specifying malicious circuit properties , 2013, 2013 IEEE 4th International Conference on Electronics Information and Emergency Communication.