A Novel Technique for Improving Hardware Trojan Detection and Reducing Trojan Activation Time

被引:190
作者
Salmani, Hassan [1 ]
Tehranipoor, Mohammad [1 ]
Plusquellic, Jim [2 ]
机构
[1] Univ Connecticut, Dept Elect & Comp Engn, Storrs, CT 06269 USA
[2] Univ New Mexico, Dept Elect & Comp Engn, Albuquerque, NM 87131 USA
基金
美国国家科学基金会;
关键词
Dummy flip-flop insertion; hardware trojan; security; trojan activation time; trojan detection;
D O I
10.1109/TVLSI.2010.2093547
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Fabless semiconductor industry and government agencies have raised serious concerns about tampering with inserting hardware Trojans in an integrated circuit supply chain in recent years. Most of the recently proposed Trojan detection methods are based on Trojan activation to observe either a faulty output or measurable abnormality on side-channel signals. Time to activate a hardware Trojan circuit is a major concern from the authentication standpoint. This paper analyzes time to generate a transition in functional Trojans. Transition is modeled by geometric distribution and the number of clock cycles required to generate a transition is estimated. Furthermore, a dummy scan flip-flop insertion procedure is proposed aiming at decreasing transition generation time. The procedure increases transition probabilities of nets beyond a specific threshold. The relation between circuit topology, authentication time, and the threshold is carefully studied. The simulation results on s38417 benchmark circuit demonstrate that, with a negligible area overhead, our proposed method can significantly increase Trojan activity and reduce Trojan activation time.
引用
收藏
页码:112 / 125
页数:14
相关论文
共 23 条
[1]  
Acharya A, 2009, INT CONF PERVAS COMP, P11
[2]   Trojan detection using IC fingerprinting [J].
Agrawal, Dakshi ;
Baktir, Selcuk ;
Karakoyunlu, Deniz ;
Rohatgi, Pankaj ;
Sunar, Berk .
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, :296-+
[3]  
Alkabani Yousra, 2009, Proceedings of the 2009 IEEE/ACM International Conference on Computer-Aided Design (ICCAD 2009), P123, DOI 10.1145/1687399.1687426
[4]  
[Anonymous], US MAN
[5]  
[Anonymous], 2008, MATH STAT APPL
[6]  
[Anonymous], DEF SCI BOARD TASK F
[7]  
[Anonymous], 2008, IEEE SPECTRUM
[8]  
Banga M., 2008, P 18 ACM GREAT LAK S, P363, DOI [DOI 10.1145/1366110.1366196, 10.1145/13661101366196]
[9]   A region based approach for the identification of hardware Trojans [J].
Banga, Mainak ;
Hsiao, Michael S. .
2008 IEEE INTERNATIONAL WORKSHOP ON HARDWARE-ORIENTED SECURITY AND TRUST, 2008, :40-47
[10]   A Novel Sustained Vector Technique for the Detection of Hardware Trojans [J].
Banga, Mainak ;
Hsiao, Michael S. .
22ND INTERNATIONAL CONFERENCE ON VLSI DESIGN HELD JOINTLY WITH 8TH INTERNATIONAL CONFERENCE ON EMBEDDED SYSTEMS, PROCEEDINGS, 2009, :327-332