Symbolic execution based test-patterns generation algorithm for hardware Trojan detection

Abstract Hardware Trojan detection is a very difficult challenge. However, the combination of symbolic execution and metamorphic testing is useful for detecting hardware Trojans in Verilog code. In this paper, symbolic execution and metamorphic testing were combined to detect internal conditionally triggered hardware Trojans in the register-transfer level design. First, control flow graphs of Verilog code were generated. Next, parallel symbolic execution and satisfiability modulo theories solver generated test patterns. Finally, metamorphic testing detected the hardware Trojans. The work used Trust-Hub benchmarks in experiments.

[1]  Georg Sigl,et al.  Hardware Trojans: current challenges and approaches , 2014, IET Comput. Digit. Tech..

[2]  Yiorgos Makris,et al.  Hardware Trojans in Wireless Cryptographic ICs , 2010, IEEE Design & Test of Computers.

[3]  Kwang-Ting Cheng,et al.  Detecting hardware Trojans in unspecified functionality using mutation testing , 2015, 2015 IEEE/ACM International Conference on Computer-Aided Design (ICCAD).

[4]  Cesare Tinelli,et al.  Satisfiability Modulo Theories , 2018, Handbook of Model Checking.

[5]  Roshni Shende,et al.  A side channel based power analysis technique for hardware trojan detection using statistical learning approach , 2016, 2016 Thirteenth International Conference on Wireless and Optical Communications Networks (WOCN).

[6]  Wei Hu,et al.  Gate-Level Information Flow Tracking for Security Lattices , 2014, TODE.

[7]  Nikolaj Bjørner,et al.  Satisfiability modulo theories , 2011, Commun. ACM.

[8]  Xue Mingfu,et al.  Detecting Hardware Trojan through heuristic partition and activity driven test pattern generation , 2014 .

[9]  Mark Mohammad Tehranipoor,et al.  On design vulnerability analysis and trust benchmarks development , 2013, 2013 IEEE 31st International Conference on Computer Design (ICCD).

[10]  Michael S. Hsiao,et al.  Hardware Trojan Attacks: Threat Analysis and Countermeasures , 2014, Proceedings of the IEEE.

[11]  Shinya Takamaeda-Yamazaki,et al.  Pyverilog: A Python-Based Hardware Design Processing Toolkit for Verilog HDL , 2015, ARC.

[12]  Huang Song,et al.  Study of Metamorphic Testing , 2013 .

[13]  Tsong Yueh Chen,et al.  Metamorphic Testing: A New Approach for Generating Next Test Cases , 2020, ArXiv.

[14]  James C. King,et al.  Symbolic execution and program testing , 1976, CACM.

[15]  Michael S. Hsiao,et al.  Trusted RTL: Trojan detection methodology in pre-silicon designs , 2010, 2010 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST).

[16]  Katherine Shu-Min Li,et al.  Test generation for combinational hardware Trojans , 2016, 2016 IEEE Asian Hardware-Oriented Security and Trust (AsianHOST).

[17]  Zainalabedin Navabi,et al.  A New Approach for Automatic Test Pattern Generation in Register Transfer Level Circuits , 2013, IEEE Design & Test.

[18]  Wei Hu,et al.  Register transfer level information flow tracking for provably secure hardware design , 2017, Design, Automation & Test in Europe Conference & Exhibition (DATE), 2017.

[19]  Cesare Tinelli,et al.  Satisfiability Modulo Theories , 2021, Handbook of Satisfiability.

[20]  Kwang-Ting Cheng,et al.  Detecting hardware Trojans in unspecified functionality through solving satisfiability problems , 2017, 2017 22nd Asia and South Pacific Design Automation Conference (ASP-DAC).

[21]  Jie Zhang,et al.  On hardware Trojan design and implementation at register-transfer level , 2013, 2013 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST).

[22]  Debdeep Mukhopadhyay,et al.  Improved Test Pattern Generation for Hardware Trojan Detection Using Genetic Algorithm and Boolean Satisfiability , 2015, CHES.

[23]  Yuval Elovici,et al.  USB-based attacks , 2017, Comput. Secur..

[24]  Simha Sethumadhavan,et al.  Silencing Hardware Backdoors , 2011, 2011 IEEE Symposium on Security and Privacy.

[25]  Sylvain Guilley,et al.  Hardware Trojan detection by delay and electromagnetic measurements , 2015, 2015 Design, Automation & Test in Europe Conference & Exhibition (DATE).

[26]  Mark Mohammad Tehranipoor,et al.  Benchmarking of Hardware Trojans and Maliciously Affected Circuits , 2017, Journal of Hardware and Systems Security.

[27]  Qiang Liu,et al.  A survey of hardware Trojan threat and defense , 2016, Integr..

[28]  Farinaz Koushanfar,et al.  A Survey of Hardware Trojan Taxonomy and Detection , 2010, IEEE Design & Test of Computers.