Only few solutions for Hardware Trojan (HT) detection work at Register-Transfer Level (RTL), thus delaying the identification of possible security issues at lower abstraction levels of the design process. In addition, the most of existing approaches work only for specific kinds of HTs. To overcome these limitations, we present a verification approach that detects different types of HTs in RTL models by exploiting an efficient control-flow subgraph matching algorithm. The prototypes of HTs that can be detected are modelled in a library by using Control-Flow Graphs (CFGs) that can be parametrised and extended to cover several variants of Trojan patterns. Experimental results show that our approach is effective and efficient in comparison with other state-of-the-art solutions.
|Titolo:||Efficient Control-Flow Subgraph Matching for Detecting Hardware Trojans in RTL Models|
|Autori interni:||PRAVADELLI, Graziano|
|Data di pubblicazione:||2017|
|Rivista:||ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS|
|Appare nelle tipologie:||01.01 Articolo in Rivista|