• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Cui Xiaotong, Zou Minhui, Wu Kaijie. Identifying Inactive Nets in Function Mode of Circuits[J]. Journal of Computer Research and Development, 2017, 54(1): 163-171. DOI: 10.7544/issn1000-1239.2017.20150937
Citation: Cui Xiaotong, Zou Minhui, Wu Kaijie. Identifying Inactive Nets in Function Mode of Circuits[J]. Journal of Computer Research and Development, 2017, 54(1): 163-171. DOI: 10.7544/issn1000-1239.2017.20150937

Identifying Inactive Nets in Function Mode of Circuits

More Information
  • Published Date: December 31, 2016
  • The globalization trend of design and manufacture of IC raises serious concerns about hardware security since there is possibility that in each phase of design and manufacture hardware Trojan can be inserted. From the defender’s perspective, hardware Trojan in the host circuit may stay inactive for most of time but will result in disastrous consequences once activated, such as information leakage, false output, system crash, etc. As far as an attacker concerned, one of important design criteria is to prevent the Trojan circuit from being accidently activated. It is believed that inactive nets with lower switching probabilities in the circuit are more likely to be selected as the trigger signals of Trojan circuits. Hence finding these inactive nets is one of the existing countermeasures. However, current techniques only focus on finding inactive nets in test mode of the circuit. This paper proposes a method that can find inactive nets in function mode of the testing circuit. From an attacker’s point of view, the nets that are inactive in both test mode and function mode are the best candidates for Trojan triggers—it will result in the lowest probability of accidental activation of Trojan circuits in both modes. Hence for a defender, focusing on these nets will improve the efficiency of Trojan detection significantly.
  • Related Articles

    [1]Zhao Anning, Xu Nuo, Liu Kang, Luo Li, Pan Bingzheng, Bo Ziyi, Tan Chenghao. The Synthesis of Multiple Stateful Logic Gates for In-memory Computing with Low Wear[J]. Journal of Computer Research and Development, 2025, 62(3): 620-632. DOI: 10.7544/issn1000-1239.202440627
    [2]Xu Lijuan, Wang Bailing, Yang Meihong, Zhao Dawei, Han Jideng. Multi-Mode Attack Detection and Evaluation of Abnormal States for Industrial Control Network[J]. Journal of Computer Research and Development, 2021, 58(11): 2333-2349. DOI: 10.7544/issn1000-1239.2021.20210598
    [3]Li Yin. Test Suite Generating for Stateful Web Services Using Interface Contract[J]. Journal of Computer Research and Development, 2017, 54(3): 609-622. DOI: 10.7544/issn1000-1239.2017.20151045
    [4]Yi Maoxiang, Yu Chenglin, Fang Xiangsheng, Huang Zhengfeng, Ouyang Yiming, Liang Huaguo. State Vector Selective Generation of Parallel Folding Counters[J]. Journal of Computer Research and Development, 2015, 52(11): 2468-2475. DOI: 10.7544/issn1000-1239.2015.20140591
    [5]Zhao Ze, Shang Pengfei, Liu Qiang, Cui Li. Identification of Communication State for Wireless Sensor Networks[J]. Journal of Computer Research and Development, 2014, 51(11): 2382-2392. DOI: 10.7544/issn1000-1239.2014.20131079
    [6]Li Zhetao, Wang Zhiqiang, Zhu Gengming, Li Renfa. A Data Gathering MAC Protocol Based on State Translation and Grouping for WSN[J]. Journal of Computer Research and Development, 2014, 51(6): 1167-1175.
    [7]Xie Zhengwei, Zhai Ying, Deng Peimin, Yi Zhong. Algebraic Properties of Probabilistic Finite State Automata[J]. Journal of Computer Research and Development, 2013, 50(12): 2691-2698.
    [8]Yu Wanjun, Liu Dayou, Liu Quan, Yang Bo. An Approach to Monitoring and Controlling Workflow Systems Based on the Instance State[J]. Journal of Computer Research and Development, 2006, 43(8): 1345-1353.
    [9]Zhang Shichao, Xu Yinjun, Gu Ning, Shi Baile. A Norm-Driven Grid Workflow State Machine Model[J]. Journal of Computer Research and Development, 2006, 43(2): 307-313.
    [10]Huang Kui, Wu Yichuan, Zheng Jianping, Wu Zhimei. Forwarding State Reduction Scheme Based on Interface Format for Sparse Mode Multicast[J]. Journal of Computer Research and Development, 2005, 42(9): 1564-1570.

Catalog

    Article views (1122) PDF downloads (451) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return