Survey on model checking based hardware Trojan detection technology

Hardware Trojan is malicious tampering to the original circuit, which has become the most important security threat of integrated circuit.In order to ensure the safety and reliability of ICs, many hardware Trojan detection methods are proposed.As one of the formal verification methods, model checkin...

Full description

Saved in:
Bibliographic Details
Main Authors: Qizhi ZHANG, Yiqiang ZHAO, Ya GAO, Haocheng MA
Format: Article
Language:English
Published: POSTS&TELECOM PRESS Co., LTD 2021-04-01
Series:网络与信息安全学报
Subjects:
Online Access:http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2021029
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841529858339897344
author Qizhi ZHANG
Yiqiang ZHAO
Ya GAO
Haocheng MA
author_facet Qizhi ZHANG
Yiqiang ZHAO
Ya GAO
Haocheng MA
author_sort Qizhi ZHANG
collection DOAJ
description Hardware Trojan is malicious tampering to the original circuit, which has become the most important security threat of integrated circuit.In order to ensure the safety and reliability of ICs, many hardware Trojan detection methods are proposed.As one of the formal verification methods, model checking can effectively detect the hardware Trojan in the design phase.Firstly, the working principle and process of model checking were described.Secondly, the research progress of hardware Trojan detection technology based on model checking was introduced.Finally, the bottlenecks faced by the current technology were pointed out and the potential research direction was discussed.
format Article
id doaj-art-1add194ed0784565839b2b9fb177e316
institution Kabale University
issn 2096-109X
language English
publishDate 2021-04-01
publisher POSTS&TELECOM PRESS Co., LTD
record_format Article
series 网络与信息安全学报
spelling doaj-art-1add194ed0784565839b2b9fb177e3162025-01-15T03:14:56ZengPOSTS&TELECOM PRESS Co., LTD网络与信息安全学报2096-109X2021-04-017576359565858Survey on model checking based hardware Trojan detection technologyQizhi ZHANGYiqiang ZHAOYa GAOHaocheng MAHardware Trojan is malicious tampering to the original circuit, which has become the most important security threat of integrated circuit.In order to ensure the safety and reliability of ICs, many hardware Trojan detection methods are proposed.As one of the formal verification methods, model checking can effectively detect the hardware Trojan in the design phase.Firstly, the working principle and process of model checking were described.Secondly, the research progress of hardware Trojan detection technology based on model checking was introduced.Finally, the bottlenecks faced by the current technology were pointed out and the potential research direction was discussed.http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2021029hardware Trojanmodel checkingmodel establishingproperty declaration
spellingShingle Qizhi ZHANG
Yiqiang ZHAO
Ya GAO
Haocheng MA
Survey on model checking based hardware Trojan detection technology
网络与信息安全学报
hardware Trojan
model checking
model establishing
property declaration
title Survey on model checking based hardware Trojan detection technology
title_full Survey on model checking based hardware Trojan detection technology
title_fullStr Survey on model checking based hardware Trojan detection technology
title_full_unstemmed Survey on model checking based hardware Trojan detection technology
title_short Survey on model checking based hardware Trojan detection technology
title_sort survey on model checking based hardware trojan detection technology
topic hardware Trojan
model checking
model establishing
property declaration
url http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2021029
work_keys_str_mv AT qizhizhang surveyonmodelcheckingbasedhardwaretrojandetectiontechnology
AT yiqiangzhao surveyonmodelcheckingbasedhardwaretrojandetectiontechnology
AT yagao surveyonmodelcheckingbasedhardwaretrojandetectiontechnology
AT haochengma surveyonmodelcheckingbasedhardwaretrojandetectiontechnology