{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T03:23:59Z","timestamp":1725506639149},"reference-count":0,"publisher":"EasyChair","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"abstract":"<jats:p>This paper presents a non-reversible method for stealthily inserting hardware Tro- jan (HT) based on a path delay fault called Path Delay HT (PDHT). While PDHT is hardly detected by the conventional methods including Monte-Carlo tests, its practicality is still unclear because a rarely sensitized path used for PDHT is selected and exploited in a deterministic manner. Such deterministic method indicates that we can find possible PDHT-inserted paths by its reversed method. In addition, the conventional method uses a genetic algorithm to add extra delays onto the selected path for inducing a path delay fault, and therefore, we have a difficulty in evaluating the resistance\/vulnerability of a circuit to PDHT. This paper first presents a new method for selecting sufficiently rare paths to insert PDHT at random. We then show that the detectability\/stealthiness of PDHT is related to switching activity (i.e., glitch effect), and present a new systematic method for inducing a path delay fault instead of GA. We demonstrate through an experimental PDHT-insertion and a Monte-Carlo test that the PDHT inserted by our method is sufficiently undetectable in comparison with the conventional method.<\/jats:p>","DOI":"10.29007\/fxvv","type":"proceedings-article","created":{"date-parts":[[2018,9,10]],"date-time":"2018-09-10T19:44:02Z","timestamp":1536608642000},"page":"50-31","source":"Crossref","is-referenced-by-count":0,"title":["A Non-Reversible Insertion Method for Hardware Trojans Based on Path Delay Faults"],"prefix":"10.29007","volume":"7","author":[{"given":"Akira","family":"Ito","sequence":"first","affiliation":[]},{"given":"Rei","family":"Ueno","sequence":"additional","affiliation":[]},{"given":"Naofumi","family":"Homma","sequence":"additional","affiliation":[]},{"given":"Takafumi","family":"Aoki","sequence":"additional","affiliation":[]}],"member":"11545","event":{"name":"PROOFS 2018. 7th International Workshop on Security Proofs for Embedded Systems"},"container-title":["Kalpa Publications in Computing"],"original-title":[],"deposited":{"date-parts":[[2018,9,10]],"date-time":"2018-09-10T19:44:04Z","timestamp":1536608644000},"score":1,"resource":{"primary":{"URL":"https:\/\/easychair.org\/publications\/paper\/ZbpT"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":0,"URL":"https:\/\/doi.org\/10.29007\/fxvv","relation":{},"ISSN":["2515-1762"],"issn-type":[{"type":"print","value":"2515-1762"}],"subject":[]}}