| Article ID | Journal | Published Year | Pages | File Type | 
|---|---|---|---|---|
| 6883826 | Computers & Security | 2018 | 17 Pages | 
Abstract
												Hardware Trojan detection is a very difficult challenge. However, the combination of symbolic execution and metamorphic testing is useful for detecting hardware Trojans in Verilog code. In this paper, symbolic execution and metamorphic testing were combined to detect internal conditionally triggered hardware Trojans in the register-transfer level design. First, control flow graphs of Verilog code were generated. Next, parallel symbolic execution and satisfiability modulo theories solver generated test patterns. Finally, metamorphic testing detected the hardware Trojans. The work used Trust-Hub benchmarks in experiments.
											Keywords
												
											Related Topics
												
													Physical Sciences and Engineering
													Computer Science
													Computer Networks and Communications
												
											Authors
												Shen Lixiang, Mu Dejun, Cao Guo, Qin Maoyuan, Jeremy Blackstone, Ryan Kastner, 
											