A study on the effectiveness of Trojan detection techniques using a red team blue team approach

X. Zhang, K. Xiao, M. Tehranipoor, J. Rajendran, R. Karri

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

As part of the Embedded Systems Challenge, we assess the effectiveness of Trojan detection techniques. The red team inserted different types of Trojans - combinational, sequential, reliability degrading, and performance degrading - into selected variants of a target design; the other variants are Trojan-free. The blue team has to correctly classify the Trojan-free and Trojan-infected variants. Seven different teams from six different universities performed the blue team activity using different types of Trojan-detection techniques, namely activation-based detection, and power- and delay-based side-channels.

Original languageEnglish (US)
Title of host publicationProceedings - 2013 IEEE 31st VLSI Test Symposium, VTS 2013
DOIs
StatePublished - 2013
Event2013 IEEE 31st VLSI Test Symposium, VTS 2013 - Berkeley, CA, United States
Duration: Apr 29 2013May 1 2013

Other

Other2013 IEEE 31st VLSI Test Symposium, VTS 2013
CountryUnited States
CityBerkeley, CA
Period4/29/135/1/13

Fingerprint

Embedded systems
Chemical activation

ASJC Scopus subject areas

  • Electrical and Electronic Engineering
  • Computer Science Applications

Cite this

Zhang, X., Xiao, K., Tehranipoor, M., Rajendran, J., & Karri, R. (2013). A study on the effectiveness of Trojan detection techniques using a red team blue team approach. In Proceedings - 2013 IEEE 31st VLSI Test Symposium, VTS 2013 [6548922] https://doi.org/10.1109/VTS.2013.6548922

A study on the effectiveness of Trojan detection techniques using a red team blue team approach. / Zhang, X.; Xiao, K.; Tehranipoor, M.; Rajendran, J.; Karri, R.

Proceedings - 2013 IEEE 31st VLSI Test Symposium, VTS 2013. 2013. 6548922.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Zhang, X, Xiao, K, Tehranipoor, M, Rajendran, J & Karri, R 2013, A study on the effectiveness of Trojan detection techniques using a red team blue team approach. in Proceedings - 2013 IEEE 31st VLSI Test Symposium, VTS 2013., 6548922, 2013 IEEE 31st VLSI Test Symposium, VTS 2013, Berkeley, CA, United States, 4/29/13. https://doi.org/10.1109/VTS.2013.6548922
Zhang X, Xiao K, Tehranipoor M, Rajendran J, Karri R. A study on the effectiveness of Trojan detection techniques using a red team blue team approach. In Proceedings - 2013 IEEE 31st VLSI Test Symposium, VTS 2013. 2013. 6548922 https://doi.org/10.1109/VTS.2013.6548922
Zhang, X. ; Xiao, K. ; Tehranipoor, M. ; Rajendran, J. ; Karri, R. / A study on the effectiveness of Trojan detection techniques using a red team blue team approach. Proceedings - 2013 IEEE 31st VLSI Test Symposium, VTS 2013. 2013.
@inproceedings{73b1c84b83514c599ce0310aecbf3ee3,
title = "A study on the effectiveness of Trojan detection techniques using a red team blue team approach",
abstract = "As part of the Embedded Systems Challenge, we assess the effectiveness of Trojan detection techniques. The red team inserted different types of Trojans - combinational, sequential, reliability degrading, and performance degrading - into selected variants of a target design; the other variants are Trojan-free. The blue team has to correctly classify the Trojan-free and Trojan-infected variants. Seven different teams from six different universities performed the blue team activity using different types of Trojan-detection techniques, namely activation-based detection, and power- and delay-based side-channels.",
author = "X. Zhang and K. Xiao and M. Tehranipoor and J. Rajendran and R. Karri",
year = "2013",
doi = "10.1109/VTS.2013.6548922",
language = "English (US)",
isbn = "9781467355438",
booktitle = "Proceedings - 2013 IEEE 31st VLSI Test Symposium, VTS 2013",

}

TY - GEN

T1 - A study on the effectiveness of Trojan detection techniques using a red team blue team approach

AU - Zhang, X.

AU - Xiao, K.

AU - Tehranipoor, M.

AU - Rajendran, J.

AU - Karri, R.

PY - 2013

Y1 - 2013

N2 - As part of the Embedded Systems Challenge, we assess the effectiveness of Trojan detection techniques. The red team inserted different types of Trojans - combinational, sequential, reliability degrading, and performance degrading - into selected variants of a target design; the other variants are Trojan-free. The blue team has to correctly classify the Trojan-free and Trojan-infected variants. Seven different teams from six different universities performed the blue team activity using different types of Trojan-detection techniques, namely activation-based detection, and power- and delay-based side-channels.

AB - As part of the Embedded Systems Challenge, we assess the effectiveness of Trojan detection techniques. The red team inserted different types of Trojans - combinational, sequential, reliability degrading, and performance degrading - into selected variants of a target design; the other variants are Trojan-free. The blue team has to correctly classify the Trojan-free and Trojan-infected variants. Seven different teams from six different universities performed the blue team activity using different types of Trojan-detection techniques, namely activation-based detection, and power- and delay-based side-channels.

UR - http://www.scopus.com/inward/record.url?scp=84881296828&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84881296828&partnerID=8YFLogxK

U2 - 10.1109/VTS.2013.6548922

DO - 10.1109/VTS.2013.6548922

M3 - Conference contribution

SN - 9781467355438

BT - Proceedings - 2013 IEEE 31st VLSI Test Symposium, VTS 2013

ER -