Aviso: para depositar documentos, por favor, inicia sesión e identifícate con tu cuenta de correo institucional de la UCM con el botón MI CUENTA UCM. No emplees la opción AUTENTICACIÓN CON CONTRASEÑA
 

Hardware Trojan detection via rewriting logic

dc.contributor.authorAsavoae, Irina Mariuca
dc.contributor.authorTofighi Shirazi, Ramtine
dc.contributor.authorRiesco Rodríguez, Adrián
dc.contributor.authorYasuyoshi, Uemura
dc.date.accessioned2023-12-18T17:34:23Z
dc.date.available2023-12-18T17:34:23Z
dc.date.issued2022
dc.description.abstractHardware security studies, discovers, and classifies hardware attacks as well as defense strategies such as prevention and protection methods along the entire hardware production chain. Hardware Trojans represents a hardware attack model that emerged in the last decades in the hardware security community. In this paper, we present a methodology for achieving a scalable approach to detect hardware Trojans at the design stage using program transformation in a rewrite-based environment. We note that the hardware Trojan attack considered here assumes the vulnerability introduction during the hardware design stage while the payload is obtained as information leakage during the hardware usage. The main contribution in our work is the methodology correctness proof for a high security evaluation assurance level. We also benchmark the effectiveness of our methodology on industrial hardware designs, e.g., Advanced Encryption Standard cores, which is widely used and deployed for numerous devices and applications.
dc.description.departmentDepto. de Sistemas Informáticos y Computación
dc.description.facultyFac. de Informática
dc.description.refereedTRUE
dc.description.sponsorshipComunidad de Madrid
dc.description.sponsorshipEuropean Commission
dc.description.statuspub
dc.identifier.citationAsăvoae, Irina Măriuca, et al. «Hardware Trojan Detection via Rewriting Logic». Journal of Logical and Algebraic Methods in Programming, vol. 127, junio de 2022, p. 100762. https://doi.org/10.1016/j.jlamp.2022.100762.
dc.identifier.doi10.1016/j.jlamp.2022.100762
dc.identifier.issn2352-2208
dc.identifier.officialurlhttps://doi.org/10.1016/j.jlamp.2022.100762
dc.identifier.urihttps://hdl.handle.net/20.500.14352/91467
dc.journal.titleJournal of Logical and Algebraic Methods in Programming
dc.language.isoeng
dc.publisherElsevier
dc.rightsAttribution-NonCommercial-NoDerivatives 4.0 Internationalen
dc.rights.accessRightsrestricted access
dc.rights.urihttp://creativecommons.org/licenses/by-nc-nd/4.0/
dc.subject.ucmInformática (Informática)
dc.subject.unesco1203.17 Informática
dc.titleHardware Trojan detection via rewriting logic
dc.typejournal article
dc.type.hasVersionVoR
dc.volume.number127
dspace.entity.typePublication
relation.isAuthorOfPublication068dda11-d320-4634-a908-28a4bc4b0eb4
relation.isAuthorOfPublication.latestForDiscovery068dda11-d320-4634-a908-28a4bc4b0eb4

Download

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Hardware_Trojan_detection.pdf
Size:
565.13 KB
Format:
Adobe Portable Document Format

Collections