Benchmarking of Hardware Trojans and Maliciously Affected Circuits. Shakya, B., He, T., Salmani, H., Forte, D., Bhunia, S., & Tehranipoor, M. Journal of Hardware and Systems Security, 1(1):85–102, March, 2017.
Benchmarking of Hardware Trojans and Maliciously Affected Circuits [link]Paper  doi  abstract   bibtex   
Research in the field of hardware Trojans has seen significant growth in the past decade. However, standard benchmarks to evaluate hardware Trojans and their detection are lacking. To this end, we have developed a suite of Trojans and ‘trust benchmarks’ (i.e., benchmark circuits with a hardware Trojan inserted in them) that can be used by researchers in the community to compare and contrast various Trojan detection techniques. In this paper, we present a comprehensive vulnerability analysis flow at various levels of abstraction of digital-design, that has been utilized to create these trust benchmarks. Further, we present a detailed evaluation of our benchmarks in terms of metrics such as Trojan detectability, and in the context of different attack models. Finally, we discuss future work such as automatic Trojan insertion into any arbitrary circuit.
@article{shakya_benchmarking_2017,
	title = {Benchmarking of {Hardware} {Trojans} and {Maliciously} {Affected} {Circuits}},
	volume = {1},
	issn = {2509-3428, 2509-3436},
	url = {https://link.springer.com/article/10.1007/s41635-017-0001-6},
	doi = {10.1007/s41635-017-0001-6},
	abstract = {Research in the field of hardware Trojans has seen significant growth in the past decade. However, standard benchmarks to evaluate hardware Trojans and their detection are lacking. To this end, we have developed a suite of Trojans and ‘trust benchmarks’ (i.e., benchmark circuits with a hardware Trojan inserted in them) that can be used by researchers in the community to compare and contrast various Trojan detection techniques. In this paper, we present a comprehensive vulnerability analysis flow at various levels of abstraction of digital-design, that has been utilized to create these trust benchmarks. Further, we present a detailed evaluation of our benchmarks in terms of metrics such as Trojan detectability, and in the context of different attack models. Finally, we discuss future work such as automatic Trojan insertion into any arbitrary circuit.},
	language = {en},
	number = {1},
	urldate = {2018-05-09},
	journal = {Journal of Hardware and Systems Security},
	author = {Shakya, Bicky and He, Tony and Salmani, Hassan and Forte, Domenic and Bhunia, Swarup and Tehranipoor, Mark},
	month = mar,
	year = {2017},
	pages = {85--102},
}

Downloads: 0