Temperature Tracking: Toward Robust Run-Time Detection of Hardware Trojans

被引:57
作者
Bao, Chongxi [1 ]
Forte, Domenic [2 ]
Srivastava, Ankur [1 ]
机构
[1] Univ Maryland, Dept Elect & Comp Engn, College Pk, MD 20742 USA
[2] Univ Connecticut, Dept Elect & Comp Engn, Storrs, CT 06269 USA
基金
美国国家科学基金会;
关键词
Extended Kalman filter (EKF); hardware Trojan; KF; run-time detection; temperature tracking; LEAKAGE;
D O I
10.1109/TCAD.2015.2424929
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The hardware Trojan threat has motivated development of Trojan detection schemes at all stages of the integrated circuit (IC) lifecycle. While the majority of existing schemes focus on ICs at test-time, there are many unique advantages offered by post-deployment/run-time Trojan detection. However, run-time approaches have been underutilized with prior work highlighting the challenges of implementing them with limited hardware resources. In this paper, we propose three innovative low-overhead approaches for run-time Trojan detection which exploit the thermal sensors already available in many modern systems to detect deviations in power/thermal profiles caused by Trojan activation. The first one is a local sensor-based approach that uses information from thermal sensors together with hypothesis testing to make a decision. The second one is a global approach that exploits correlation between sensors and maintains track of the ICs thermal profile using a Kalman filter (KF). The third approach incorporates leakage power into the system dynamic model and apply extended KF (EKF) to track ICs thermal profile. Simulation results using state-of-the-art tools on ten publicly available Trojan benchmarks verify that all three proposed approaches can detect active Trojans quickly and with few false positives. Among three approaches, EKF is flawless in terms of the ten benchmarks tested but would require the most overhead.
引用
收藏
页码:1577 / 1585
页数:9
相关论文
共 34 条
  • [1] Examining the Link Between Issue Attitudes and News Source: The Case of Latinos and Immigration Reform
    Abrajano, Marisa
    Singh, Simran
    [J]. POLITICAL BEHAVIOR, 2009, 31 (01) : 1 - 30
  • [2] [Anonymous], 2010, P 2010 IEEE INT WORK
  • [3] [Anonymous], 2012, Optimal Estimation of Dynamic Systems
  • [4] A case study in hardware Trojan design and implementation
    Baumgarten, Alex
    Steffen, Michael
    Clausman, Matthew
    Zambreno, Joseph
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2011, 10 (01) : 1 - 14
  • [5] Protection Against Hardware Trojan Attacks: Towards a Comprehensive Solution
    Bhunia, Swarup
    Abramovici, Miron
    Agrawal, Dakshi
    Bradley, Paul
    Hsiao, Michael S.
    Plusquellic, Jim
    Tehranipoor, Mohammad
    [J]. IEEE DESIGN & TEST, 2013, 30 (03) : 6 - 17
  • [6] Bilzor M., 2012, Proceedings 2012 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST 2012), P49, DOI 10.1109/HST.2012.6224318
  • [7] Forte D, 2013, ICCAD-IEEE ACM INT, P532, DOI 10.1109/ICCAD.2013.6691167
  • [8] System level leakage reduction considering the interdependence of temperature and leakage
    He, L
    Liao, WP
    Stan, MR
    [J]. 41ST DESIGN AUTOMATION CONFERENCE, PROCEEDINGS 2004, 2004, : 12 - 17
  • [9] Overcoming an Untrusted Computing Base: Detecting and Removing Malicious Hardware Automatically
    Hicks, Matthew
    Finnicum, Murph
    King, Samuel T.
    Martin, Milo M. K.
    Smith, Jonathan M.
    [J]. 2010 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, 2010, : 159 - 172
  • [10] Hu KQ, 2013, DES AUT TEST EUROPE, P1271