
On the other hand, the Hardware Trojans detection
method represents the subject of a future research
paper.
3. Conclusion
In this paper there was presented a “Time-Bomb”
Trojan triggering method for Hardware Trojans.
The assertion techniques of the Hardware Trojan have
become a sensitive security concern for digital
systems. Thus, the detection methods became a very
challenging problem. By the nature of the “Hardware
Trojan” it is designed to avoid detection since they
usually run in “hidden” mode and are activated when
certain conditions are fulfilled.
Regarding the detection of the triggering “Time-
Bomb” Trojan there can be used a shadow-latch based
on delay characterization techniques. This will be the
subject for a future research paper.
Because of the varied nature of the Hardware Trojans,
the detection of them became very challenging and it
required a combination of techniques both during
design and test in order to provide an acceptable level
of security.
Another method to trigger “Time-Bomb” Trojans is by
using an asynchronous counter or hybrid counter.
These methods will be the subject for a future research
paper.
A 100% detection of the Hardware Trojans seems to be
impossible because of the diversity of the Hardware
Trojans types. Major future challenges would include
developing detection mechanisms for the digital and
analog Trojans. which can implement various types of
activation conditions. There are widen methods
regarding the triggering modes which avoid the IC's
testing procedures (eg. different combinations of the
primary inputs).
This study can be combined with Artificial or
Computational Intelligence and this will represent the
subject for a future research paper.
References:
[1] Mohammad Tehranipoor and Farinaz
Koushanfar, “A survey of hardware trojan
taxonomy and detection”, IEEE Design & Test
of Computer, 27:10-25,2010.
[2] Rajat Subhra Chakraborty, Seetharam
Narasimhan, Swarup Bhunia, “Hardware
Trojan: Threats and Emerging Solutions”, 978-
1-4244-4823-4, 2009, IEEE.
[3] Zie Zhang; Feng Yuan; Lingxiao Wei; Zelong
Sun; Qiang Xu “VeriTrust: Verification for
hardware trust” 50th ACM/EDAC/IEEE Design
Automation Conference (DAC), 29 May-7 June
2013, IEEE
[4] ] Syed Kamran Haider, Chenglu Jin, Masab
Ahmad, Devu Shila, Omer Khan, Marten van
Dijk, “Advancing the State-of-the-Art in
Hardware Trojans Detection”, IEEE
Transactions on Dependable and Secure
Computing (Volume: 16, Issue: 1, Jan.-Feb. 1
2019).
[5] Matthew Hicks, Cynthia Sturton, David
Wagner, “Defeating UCI: Building Stealthy and
Malicious Hardware”, Proceedings of the 2011
IEEE Symposium on Security & Privacy
[6] A. Waksman, Matthew Suozzo, S.
Sethumadhavan, “FANCI: identification of
stealthy malicious logic using boolean
functional analysis”, Proceedings of the 2013
ACM SIGSAC conference on Computer &
communications security, Published 2013, IEEE
[7] Jie Zhang, Feng Yuan, Qiang Xu, “DeTrust:
Defeating Hardware Trust Verification with
Stealthy Implicitly-Triggered Hardware
Trojans”, CCS '14: Proceedings of the 2014
ACM SIGSAC Conference on Computer and
Communications SecurityNovember 2014
Pages 153–166.
[8] Song Yao; Xiaoming Chen; Jie Zhang; Qiaoyi
Liu; Jia Wang; Qiang Xu; Yu Wang; Huazhong
Yang, “FASTrust: Feature analysis for third-
party IP trust verification”, Published in 2015
IEEE International Test Conference (ITC), 06-
08 October 2015, DOI:
10.1109/TEST.2015.7342417
[9] Chee Hoo Kok; Chia Yee Ooi; Michiko Inoue,
“Net Classification Based on Testability and
Netlist Structural Features for Hardware Trojan
Detection”, Published in 2019 IEEE 28th Asian
Test Symposium (ATS), 10-13 December 2019,
DOI: 10.1109/ATS47505.2019.00020.
[10] ML Flottes, S Dupuis, PS Ba and abd B
Rouzeyre, "On the limitations of logic testing for
detecting Hardware Trojans Horses",
International Conference on Design &
Technology of Integrated Systems in Nanoscale
Era IEEE,pp.1-5,2015.
[11] Yu Su; Haihua Shen; Renjie Lu; Yunying Ye,
“A Stealthy Hardware Trojan Design and
Corresponding Detection Method”, Published in
2021 IEEE International Symposium on Circuits
and Systems (ISCAS), 22-28 May 2021, DOI:
10.1109/ISCAS51556.2021.9401770
[12] W. Hu, L. Zhang, A. Ardeshiricham, J.
Blackstone, B. Hou, Y. Tai, et al., "Why you
should care about don’t cares: Exploiting
International Journal of Electrical Engineering and Computer Science
DOI: 10.37394/232027.2024.6.10
Grigore Mihai Timis, Alexandru Valachi