TrojanWars: Hardware Malicious Implant Detection
Hardware trojan detection is a critical process that aims to identify and mitigate the presence of malicious alterations or additions in integrated circuits or electronic devices. It involves various techniques and methodologies to ensure the integrity and trustworthiness of hardware components. Hardware trojans can be inserted during the manufacturing process, and they can pose significant risks by compromising the functionality, security, and reliability of the affected systems. Detection methods range from physical inspections, such as side-channel analysis and optical inspection, to more advanced techniques like hardware fingerprinting, anomaly detection, and formal verification. By employing a combination of these approaches, hardware trojan detection plays a vital role in safeguarding critical infrastructure, preventing unauthorized access, and maintaining the trustworthiness of electronic systems. TrojanWars utilizes efficient test generation-based techniques to activate malicious implants if present in the designs.”
Github project link : TrojanWars
Required libraries and environment
The current version of the tool will utilize the following libraries and packages.
- VCS/Icarus Verilog
- Synopsys Tmax, DC_shell
- C++ 11
- Python3
- Yosys
Cite this work
A. Jayasena and P. Mishra, “Scalable Detection of Hardware Trojans using ATPG-based Activation of Rare Events” in IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, doi: 10.1109/TCAD.2023.3290537.
@ARTICLE{Jayasena2023Scalable,
author={Jayasena, Aruna and Mishra, Prabhat},
journal={IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems},
title={Scalable Detection of Hardware Trojans using ATPG-based Activation of Rare Events},
year={2023},
volume={},
number={},
pages={1-1},
doi={10.1109/TCAD.2023.3290537}}