(Invited Paper) Hardware Trojan Detection by Fine-grained Power Domain Partitioning

被引:0
作者
Ishikawa, Takahiro [1 ]
Yokooji, Kose [1 ]
Midoh, Yoshihiro [1 ]
Miura, Noriyuki [1 ]
Shintani, Michihiro [2 ]
Shiomi, Jun [1 ]
机构
[1] Osaka Univ, Suita, Osaka, Japan
[2] Kyoto Inst Technol, Kyoto, Japan
来源
30TH ASIA AND SOUTH PACIFIC DESIGN AUTOMATION CONFERENCE, ASP-DAC 2025 | 2025年
基金
日本科学技术振兴机构;
关键词
Hardware Trojan; Hardware Security;
D O I
10.1145/3658617.3703129
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Hardware Trojans (HTs) are regarded as a security threat in the information society. HTs are unintentionally injected into LSI circuits by untrusted entities before the chip fabrication. HTs trigger malicious operations such as information leakage without designers noticing their operations. This paper proposes fine-grained power domain partitioning, which is a circuit design technique for detecting HT activities. This paper assumes a scenario where a fab injects HTs into the taped-out layout data and that circuit designers test the presence of HTs by using side-channel information (power consumption) of fabricated chips. Fine-grained power domain partitioning decomposes the power domain of target circuit into multiple power domains, enabling to effectively measure the small power consumption introduced by activities of tiny HTs. The measurement result using an HT-injected Advanced Encryption Standard (AES) circuit with fine-grained power domain partitioning shows that HTs can be detected.
引用
收藏
页码:1257 / 1263
页数:7
相关论文
共 13 条
[1]   Hardware Trojan Attacks: Threat Analysis and Countermeasures [J].
Bhunia, Swarup ;
Hsiao, Michael S. ;
Banga, Mainak ;
Narasimhan, Seetharam .
PROCEEDINGS OF THE IEEE, 2014, 102 (08) :1229-1247
[2]  
Chakraborty RS, 2009, LECT NOTES COMPUT SC, V5747, P396
[3]  
Hossain FS, 2017, PROC EUR TEST SYMP
[4]   Hardware Trojan Detection by Multiple-Parameter Side-Channel Analysis [J].
Narasimhan, Seetharam ;
Du, Dongdong ;
Chakraborty, Rajat Subhra ;
Paul, Somnath ;
Wolff, Francis G. ;
Papachristou, Christos A. ;
Roy, Kaushik ;
Bhunia, Swarup .
IEEE TRANSACTIONS ON COMPUTERS, 2013, 62 (11) :2183-2195
[5]   AdaTrust: Combinational Hardware Trojan Detection Through Adaptive Test Pattern Construction [J].
Nigh, Chris ;
Orailoglu, Alex .
IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 2021, 29 (03) :544-557
[6]   Hardware Trojan Insertion in Finalized Layouts: From Methodology to a Silicon Demonstration [J].
Perez, Tiago D. D. ;
Pagliarini, Samuel .
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2023, 42 (07) :2094-2107
[7]  
Salmani H, 2013, 2013 IEEE 31ST INTERNATIONAL CONFERENCE ON COMPUTER DESIGN (ICCD), P471, DOI 10.1109/ICCD.2013.6657085
[8]   Benchmarking of Hardware Trojans and Maliciously Affected Circuits [J].
Bicky Shakya ;
Tony He ;
Hassan Salmani ;
Domenic Forte ;
Swarup Bhunia ;
Mark Tehranipoor .
Journal of Hardware and Systems Security, 2017, 1 (1) :85-102
[9]   Power Gating: Circuits, Design Methodologies, and Best Practice for Standard-Cell VLSI Designs [J].
Shin, Youngsoo ;
Seomun, Jun ;
Choi, Kyu-Myung ;
Sakurai, Takayasu .
ACM TRANSACTIONS ON DESIGN AUTOMATION OF ELECTRONIC SYSTEMS, 2010, 15 (04)
[10]   ICAS: an Extensible Framework for Estimating the Susceptibility of IC Layouts to Additive Trojans [J].
Trippel, Timothy ;
Shin, Kang G. ;
Bush, Kevin B. ;
Hicks, Matthew .
2020 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2020), 2020, :1742-1759