<div class="csl-bib-body">
<div class="csl-entry">Krieg, C. (2023). Reflections on Trusting TrustHUB. In <i>2023 IEEE/ACM International Conference on Computer Aided Design (ICCAD) Proceedings</i> (pp. 1–9). Institute of Electrical and Electronics Engineers (IEEE). https://doi.org/10.34726/5335</div>
</div>
-
dc.identifier.uri
http://hdl.handle.net/20.500.12708/191214
-
dc.identifier.uri
https://doi.org/10.34726/5335
-
dc.description.abstract
Hardware security verification is a critical task in evaluating algorithms and tools for effectiveness and efficiency, both from an organizational and a technical view. In the past decade, the TrustHUB benchmark suite evolved as the de-facto standard benchmark suite in order to perform experiments that allow quantitative analysis of countermeasures, but also to provide statistical data on effectiveness, and performance indicators to assess practical applicability. In this work, we study the effectiveness of the TrustHUB benchmark suite, and its ability to provide meaningful and reasonable experimental data on algorithms that target security properties of digital designs. We systematically elaborate fundamental properties of effective hardware Trojan benchmarks: Correctness, Maliciousness, Stealthiness, and Persistence. We utilize these properties to classify a reasonable subset of the TrustHUB benchmark suite by means of effectiveness. The results of our study are fairly surprising: Only three out of 83 studied benchmark designs can be considered actual hardware Trojans, all others entail undocumented limitations that may impact the results of experiments that evaluate countermeasures. We introduce a comprehensive, yet simple yes/no effectiveness classification framework, with which we identify potential peculiarities that may render most of these benchmarks ineffective. We identify spots of improvement, and provide recommendations for effective benchmark design.
en
dc.language.iso
en
-
dc.rights.uri
http://rightsstatements.org/vocab/InC/1.0/
-
dc.subject
Hardware Trojans
en
dc.subject
Security
en
dc.title
Reflections on Trusting TrustHUB
en
dc.type
Inproceedings
en
dc.type
Konferenzbeitrag
de
dc.rights.license
Urheberrechtsschutz
de
dc.rights.license
In Copyright
en
dc.identifier.doi
10.34726/5335
-
dc.relation.isbn
979-8-3503-1559-2
-
dc.relation.doi
10.1109/ICCAD57390.2023
-
dc.description.startpage
1
-
dc.description.endpage
9
-
dc.rights.holder
IEEE
-
dc.type.category
Full-Paper Contribution
-
tuw.booktitle
2023 IEEE/ACM International Conference on Computer Aided Design (ICCAD) Proceedings
-
tuw.peerreviewed
true
-
tuw.relation.publisher
Institute of Electrical and Electronics Engineers (IEEE)
-
tuw.researchTopic.id
X1
-
tuw.researchTopic.name
Beyond TUW-research foci
-
tuw.researchTopic.value
100
-
tuw.publication.orgunit
E384-02 - Forschungsbereich Systems on Chip
-
tuw.publisher.doi
10.1109/ICCAD57390.2023.10323782
-
dc.identifier.libraryid
AC17203493
-
dc.description.numberOfPages
9
-
tuw.author.orcid
0000-0002-4686-757X
-
dc.rights.identifier
Urheberrechtsschutz
de
dc.rights.identifier
In Copyright
en
tuw.event.name
2023 IEEE/ACM International Conference on Computer Aided Design (ICCAD)