A Graph-Based Hardware Trojan Vulnerability Analysis Approach

Competitive Advantages 

  •     Scalable to complex networks
  •     Identifies previously unidentifiable small and stealthy limited-activation HTs
  •     Immediate attack path and time localization

Summary

USF inventors have pushed the HT triggering signal analysis boundary using a graph-based incremental window technique. The technique simultaneously considers common properties of multiple paths. As HT localization is non-trivial, graph based analysis exhibits a higher true positive detection rate than a contemporary path-based approach. Thisis achieved through invented theorems that identify rare paths. Fabless semiconductor companies who expatriate their design to outside USA can use the approach for HT detection before their products to end-users. The invention also assists designers identify potential vulnerabilities early-on during the design process.

Illustration of HT Triggering and Explicit Payload Signals Identifiable By This Approach 

Desired Partnerships

  • License
  • Sponsored Research
  • Co-Development
Patent Information: