Hardware Trojan Detection by Multiple-Parameter Side-Channel Analysis

被引:179
作者
Narasimhan, Seetharam [1 ]
Du, Dongdong [2 ]
Chakraborty, Rajat Subhra [3 ]
Paul, Somnath [4 ]
Wolff, Francis G. [1 ]
Papachristou, Christos A. [1 ]
Roy, Kaushik [5 ]
Bhunia, Swarup [1 ]
机构
[1] Case Western Reserve Univ, Dept Elect Engn & Comp Sci, Cleveland, OH 44106 USA
[2] Hyland Software, Cleveland, OH 44106 USA
[3] Indian Inst Technol, Dept Comp Sci & Engn, Kharagpur 721302, W Bengal, India
[4] Intel Corp, SoC Design Lab, Hillsboro, OR 97124 USA
[5] Purdue Univ, Sch Elect & Comp Engn, W Lafayette, IN 47907 USA
关键词
Hardware security; hardware Trojan attack; side-channel analysis; logic testing; SENSITIVITY;
D O I
10.1109/TC.2012.200
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Hardware Trojan attack in the form of malicious modification of a design has emerged as a major security threat. Side-channel analysis has been investigated as an alternative to conventional logic testing to detect the presence of hardware Trojans. However, these techniques suffer from decreased sensitivity toward small Trojans, especially because of the large process variations present in modern nanometer technologies. In this paper, we propose a novel noninvasive, multiple-parameter side-channel analysis-based Trojan detection approach. We use the intrinsic relationship between dynamic current and maximum operating frequency of a circuit to isolate the effect of a Trojan circuit from process noise. We propose a vector generation approach and several design/test techniques to improve the detection sensitivity. Simulation results with two large circuits, a 32-bit integer execution unit (IEU) and a 128-bit advanced encryption standard (AES) cipher, show a detection resolution of 1.12 percent amidst +/- 20 percent parameter variations. The approach is also validated with experimental results. Finally, the use of a combined side-channel analysis and logic testing approach is shown to provide high overall detection coverage for hardware Trojan circuits of varying types and sizes.
引用
收藏
页码:2183 / 2195
页数:13
相关论文
共 33 条
[1]   Detecting Trojans Through Leakage Current Analysis Using Multiple Supply Pad IDDQs [J].
Aarestad, Jim ;
Acharyya, Dhruva ;
Rad, Reza ;
Plusquellic, Jim .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2010, 5 (04) :893-904
[2]   Examining the Link Between Issue Attitudes and News Source: The Case of Latinos and Immigration Reform [J].
Abrajano, Marisa ;
Singh, Simran .
POLITICAL BEHAVIOR, 2009, 31 (01) :1-30
[3]   The hunt for the kill switch [J].
Adee, Sally .
IEEE SPECTRUM, 2008, 45 (05) :34-39
[4]   Trojan detection using IC fingerprinting [J].
Agrawal, Dakshi ;
Baktir, Selcuk ;
Karakoyunlu, Deniz ;
Rohatgi, Pankaj ;
Sunar, Berk .
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, :296-+
[5]  
[Anonymous], 2007, TRUST INT CIRC TIC
[6]  
[Anonymous], P 22 INT C VLSI DES
[7]  
[Anonymous], P INT C COMP AID DES
[8]   A region based approach for the identification of hardware Trojans [J].
Banga, Mainak ;
Hsiao, Michael S. .
2008 IEEE INTERNATIONAL WORKSHOP ON HARDWARE-ORIENTED SECURITY AND TRUST, 2008, :40-47
[9]   Providing secure execution environments with a last line of defense against Trojan circuit attacks [J].
Bloom, Gedare ;
Narahari, Bhagirath ;
Simha, Rahul ;
Zambreno, Joseph .
COMPUTERS & SECURITY, 2009, 28 (07) :660-669
[10]  
Borkar S, 2003, DES AUT CON, P338