Delay based hardware Trojan detection exploiting spatial correlations to suppress variations

被引:1
作者
Esirci, Fatma Nur [1 ]
Bayrakci, Alp Arslan [1 ]
机构
[1] Gebze Tech Univ, Dept Comp Engn, Kocaeli, Turkiye
关键词
Hardware security; Hardware Trojan; Side-channel analysis; Delay based detection; Spatial correlation; STATISTICAL TIMING ANALYSIS; IMPACT;
D O I
10.1016/j.vlsi.2023.03.006
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Hardware Trojan detection is a crucial problem with many dimensions and high complexity. Side channel analysis based methods are advantageous for not requiring Trojan activation but deeply suffer from process variations, the inability to detect small Trojans as well as the requirement for golden chips. In this paper, a non-invasive, golden chip free delay based hardware Trojan detection method is proposed. It exploits the inherent spatial correlations to suppress the Trojan hiding effect of the variations. The method is verified using post-manufacturing simulations under an elaborative variation model considering both inter and intra die components. The results reveal that although delay-alone approach fails to detect minimal Trojans, the proposed method achieves the detection securing more than 91% percent of a circuit on average. Moreover, if the trigger detection in cooperation with the payload detection is utilized, the detection probability exceeds 99%.
引用
收藏
页码:107 / 118
页数:12
相关论文
共 37 条
[1]   The hunt for the kill switch [J].
Adee, Sally .
IEEE SPECTRUM, 2008, 45 (05) :34-39
[2]  
Agarwal A, 2003, ICCAD-2003: IEEE/ACM DIGEST OF TECHNICAL PAPERS, P900
[3]   Stochastic logical effort as a variation aware delay model to estimate timing yield [J].
Bayrakci, Alp Arslan .
INTEGRATION-THE VLSI JOURNAL, 2015, 48 :101-108
[4]  
Beaumont Mark., 2011, Hardware Trojans-Prevention, Detection, Countermeasures (A Literature Review)
[5]   Hardware Trojan Attacks: Threat Analysis and Countermeasures [J].
Bhunia, Swarup ;
Hsiao, Michael S. ;
Banga, Mainak ;
Narasimhan, Seetharam .
PROCEEDINGS OF THE IEEE, 2014, 102 (08) :1229-1247
[6]  
Bhunia Swarup.., 2018, The Hardware Trojan War: Attacks, Myths, and Defenses, DOI [10.1007/978-3-319-68511-3, DOI 10.1007/978-3-319-68511-3]
[7]   Statistical timing analysis: From basic principles to state of the art [J].
Blaauw, David ;
Chopra, Kaviraj ;
Srivastava, Ashish ;
Scheffer, Lou .
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2008, 27 (04) :589-607
[8]  
Borkar S, 2003, DES AUT CON, P338
[9]  
Cha B, 2013, DES AUT TEST EUROPE, P1265
[10]   Statistical timing analysis under spatial correlations [J].
Chang, HL ;
Sapatnekar, SS .
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2005, 24 (09) :1467-1482