A Side Channel Based Power Analysis Technique for Hardware Trojan Detection using Statistical Learning Approach

被引:0
作者
Shende, Roshni [1 ]
Ambawade, Dayanand D. [1 ]
机构
[1] Sardar Patel Inst Technol, Dept Elect & Telecommun, Bombay, Maharashtra, India
来源
2016 THIRTEENTH IEEE AND IFIP INTERNATIONAL CONFERENCE ON WIRELESS AND OPTICAL COMMUNICATIONS NETWORKS (WOCN) | 2016年
关键词
Hardware Trojan; Hardware Trojan Horse; power analysis; side channel analysis; PCA; LDA;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Hardware Trojan (HT) is an intentional and the undesired modification of the integrated circuit (IC) and major security issue for the semiconductor industry. HT alters the normal working of IC, can leak the secret information or may damage the IC permanently. Due to the small size of the devices on IC, detection of trojan is very difficult by normal testing methods. In this paper, a side channel based trojan detection technique using power analysis is used to detect the trojan infected IC. Here a trust-hub test bench circuit is used to validate trojan detection technique in which the Trojan is inserted on AES-128 bit crypto core. The trojan detection is improved by analyzing the power of IC without trojan (Golden model) and IC with trojan (Trojan model) and by comparing the mean of power traces of both the IC. Statistical data analysis is performed and statistical parameters of power are calculated which are then used as feature vectors. These feature vectors are reduced by using Principal Component Analysis (PCA) algorithm and then classified using Linear Discriminant Analysis (LDA) which discriminates between the Golden and Trojan model and detects the trojan infected IC from the IC under test with 100% accuracy.
引用
收藏
页数:4
相关论文
共 11 条
[1]   Designer's hardware Trojan horse [J].
Alkabani, Yousra ;
Koushanfar, Farinaz .
2008 IEEE INTERNATIONAL WORKSHOP ON HARDWARE-ORIENTED SECURITY AND TRUST, 2008, :82-83
[2]   Hardware Trojan: Threats and Emerging Solutions [J].
Chakraborty, Rajat Subhra ;
Narasimhan, Seetharam ;
Bhunia, Swarup .
2009 IEEE INTERNATIONAL HIGH LEVEL DESIGN VALIDATION AND TEST WORKSHOP, 2009, :166-171
[3]  
Gunti NB, 2015, IEEE SOUTHEASTCON
[4]  
He CH, 2014, I C RELIABIL MAINTAI, P1043, DOI 10.1109/ICRMS.2014.7107362
[5]  
Jin Y, 2008, 2008 IEEE INTERNATIONAL WORKSHOP ON HARDWARE-ORIENTED SECURITY AND TRUST, P51, DOI 10.1109/HST.2008.4559049
[6]   Experiences in Hardware Trojan Design and Implementation [J].
Jin, Yier ;
Kupp, Nathan ;
Makris, Yiorgos .
2009 IEEE INTERNATIONAL WORKSHOP ON HARDWARE-ORIENTED SECURITY AND TRUST, 2009, :50-+
[7]  
Lin L., 2009, 11 INT WORKSH CRYPT
[8]   Hardware Trojan Detection by Multiple-Parameter Side-Channel Analysis [J].
Narasimhan, Seetharam ;
Du, Dongdong ;
Chakraborty, Rajat Subhra ;
Paul, Somnath ;
Wolff, Francis G. ;
Papachristou, Christos A. ;
Roy, Kaushik ;
Bhunia, Swarup .
IEEE TRANSACTIONS ON COMPUTERS, 2013, 62 (11) :2183-2195
[9]  
Ngo XT, 2015, DES AUT TEST EUROPE, P782
[10]  
Wang Li-Wei, 2011, POWER ANAL BASED APP