Code coverage analysis for IP trust verification

10Citations
Citations of this article
2Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Due to short time-to-market constraints, design house is increasing being dependent on third-party vendors to procure IPs. These IPs are designed by hundreds of IP vendors distributed across the world. Such IPs cannot be assumed to be trusted as hardware Trojans can be maliciously inserted into them and could be used in military, financial, and other critical applications. It is extremely difficult to detect Trojans in third-party IPs (3PIPs) as there is no golden version against which to compare a given IP core during verification. In this chapter, We present the modern system-on-chip (SoC) design flow and describe how it raises security concern towards the trustworthiness of third-party IP. We give a brief description of the techniques which have been proposed to verify the trustworthiness of third-party IP and also describe their limitations. We present a case study that tries to address the IP trust verification problem. This case study is based on identifying suspicious signals with formal verification, coverage analysis, removing redundant circuit, sequential automatic test pattern generation (ATPG), and equivalence theorems.

Cite

CITATION STYLE

APA

Nahiyan, A., & Tehranipoor, M. (2017). Code coverage analysis for IP trust verification. In Hardware IP Security and Trust (pp. 53–72). Springer International Publishing. https://doi.org/10.1007/978-3-319-49025-0_4

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free