Symbolic execution based test-patterns generation algorithm for hardware Trojan detection

L Shen, D Mu, G Cao, M Qin, J Blackstone… - computers & security, 2018 - Elsevier
L Shen, D Mu, G Cao, M Qin, J Blackstone, R Kastner
computers & security, 2018Elsevier
Hardware Trojan detection is a very difficult challenge. However, the combination of
symbolic execution and metamorphic testing is useful for detecting hardware Trojans in
Verilog code. In this paper, symbolic execution and metamorphic testing were combined to
detect internal conditionally triggered hardware Trojans in the register-transfer level design.
First, control flow graphs of Verilog code were generated. Next, parallel symbolic execution
and satisfiability modulo theories solver generated test patterns. Finally, metamorphic testing …
Abstract
Hardware Trojan detection is a very difficult challenge. However, the combination of symbolic execution and metamorphic testing is useful for detecting hardware Trojans in Verilog code. In this paper, symbolic execution and metamorphic testing were combined to detect internal conditionally triggered hardware Trojans in the register-transfer level design. First, control flow graphs of Verilog code were generated. Next, parallel symbolic execution and satisfiability modulo theories solver generated test patterns. Finally, metamorphic testing detected the hardware Trojans. The work used Trust-Hub benchmarks in experiments.
Elsevier
以上显示的是最相近的搜索结果。 查看全部搜索结果

Google学术搜索按钮

example.edu/paper.pdf
搜索
获取 PDF 文件
引用
References