Security verification of 3rd party intellectual property cores for information leakage

Home / Publications / Security verification of 3rd party intellectual property cores for information leakage

Jeyavijayan Rajendran, A Dhandayuthapany, Ramesh Karri, V Vedula

Globalization of the system-on-chip (SoC) design flow has created opportunities for rogue intellectual property (IP) vendors to insert malicious circuits (a.k.a. hardware Trojans) into their IPs. We propose to formally verify third party IPs (3PIPs) for unauthorized information leakage. We validate our technique using Trojan benchmarks from the Trust-Hub.