skip to main content
10.1145/2818362.2818371acmconferencesArticle/Chapter ViewAbstractPublication PagesesweekConference Proceedingsconference-collections
research-article

CHEF: A Configurable Hardware Trojan Evaluation Framework

Published: 04 October 2015 Publication History

Abstract

Evaluating approaches to hardware Trojan detection often involves the use of benchmark hardware designs in order to maintain comparability and reproducibility of experiments. However, such benchmark designs may have to be adjusted to the tool chain that is used for evaluation. Also the tool chain may have to be adjusted to an individual benchmark design. Such adjustments can be time consuming, particularly if these adjustments have to be made multiple times. In order to maintain reproducibility, such adjustments have to be documented in a way that an experiment can be repeated. It is also important that the inclusion of malicious functionality is clearly documented. In this work, we present a methodology to clearly document changes to benchmark designs and tool chains. We facilitate the advantages of the extensible markup language (XML) in order to create a set of rules that is applied to the original benchmark design or tool chain which then yields the desired adjusted benchmark or tool chain. Additionally, we provide facilities to describe an experiment in a structured way, which allows to automatically perform such an experiment. Also, it is possible to share an experiment description such that an experiment can be repeated by peers. That way, the derived conclusions from such an experiment can be dramatically strengthened.

References

[1]
C. Albrecht. IWLS 2005 Benchmarks. Presentation given at the fourteenth International Workshop on Logic and Synthesis. June 2005. url: http://iwls.org/iwls2005/benchmark_presentation.pdf.
[2]
C. Bartolini et al. "WS-TAXI: A WSDL-based Testing Tool for Web Services". In: Software Testing Verification and Validation, 2009. ICST '09. International Conference on. 2009, pp. 326--335.
[3]
F. Brglez, D. Bryan, and K. Kozminski. "Combinational profiles of sequential benchmark circuits". In: Circuits and Systems, 1989., IEEE International Symposium on. 1989, 1929--1934 vol. 3.
[4]
F. Brglez and H. Fujiwara. "A Neutral Netlist of 10 Combinational Benchmark Circuits and A Target Translator in FORTRAN". In: International Symposium on Circuits and Systems, Proceedings of the. 1985.
[5]
A. Caldwell et al. "Hypergraph partitioning for VLSI CAD: methodology for heuristic development, experimentation and reporting". In: Design Automation Conference, 1999. Proceedings. 36th. 1999, pp. 349--354.
[6]
F. Corno, M. Reorda, and G. Squillero. "RT-level ITC'99 benchmarks and first ATPG results". In: Design Test of Computers, IEEE 17.3 (2000), pp. 44--53. issn: 0740-7475.
[7]
C. Krieg et al. "Hardware Malware". In: Synthesis Lectures on Information Security, Privacy, and Trust 4.2 (2013), pp. 1--115.
[8]
ns-3. URL: https://www.nsnam.org/ Sept. 2, 2015.
[9]
opencores.org. URL: http://opencores.org/ Aug. 28, 2015.
[10]
A. Quereilhac et al. "Automating Ns-3 Experimentation in Multi-host Scenarios". In: Proceedings of the 2015 Workshop on Ns-3. WNS3 '15. Barcelona, Spain: ACM, 2015, pp. 1--8. isbn: 978-1-4503-3375-7. URL: http://doi.acm.org/10.1145/2756509.2756513.
[11]
SourceForge OpenAccess Gear. URL: http://sourceforge.net/projects/oagear/files/OAGear/0.10/ Sept. 2, 2015.
[12]
M Tehranipoor and F Koushanfar. "A Survey of Hardware Trojan Taxonomy and Detection". In: Design Test of Computers, IEEE 27.1 (2010), pp. 10--25. issn: 0740-7475.
[13]
trust-HUB.org. URL: https://www.trust-hub.org/index.php June 30, 2015.
[14]
C. Wolf and J. Glaser. "Yosys - A Free Verilog Synthesis Suite". In: Proceedings of the 21st Austrian Workshop on Microelectronics (Austrochip). 2013. URL: http://www.clifford.at/yosys/files/yosys-austrochip2013.pdf.
[15]
YOSYS. URL: http://www.clifford.at/yosys/ June 30, 2015.

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
WESS'15: Proceedings of the WESS'15: Workshop on Embedded Systems Security
October 2015
73 pages
ISBN:9781450336673
DOI:10.1145/2818362
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 04 October 2015

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Experiment automation
  2. electronic design automation
  3. hardware Trojan detection
  4. test data normalization

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Funding Sources

  • Austria Wirtschaftsservice GmbH

Conference

ESWEEK'15
ESWEEK'15: ELEVENTH EMBEDDED SYSTEM WEEK
October 4 - 9, 2015
Amsterdam, Netherlands

Acceptance Rates

Overall Acceptance Rate 8 of 21 submissions, 38%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 97
    Total Downloads
  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 13 Jan 2025

Other Metrics

Citations

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media