Data Activated Processor Hardware Trojan Detection Using Differential Bit Power Analysis

被引:1
作者
Zhang, Yang [1 ]
Quan, Hou-de [1 ]
Li, Xiong-wei [1 ]
机构
[1] Army Engn Univ, Informat Engn Dept, Shijiazhuang Campus,97 Heping West Rd, Shijiazhuang, Hebei, Peoples R China
来源
ICCSP 2018: PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON CRYPTOGRAPHY, SECURITY AND PRIVACY | 2018年
基金
中国国家自然科学基金;
关键词
Hardware Trojan; side-channel; differential bit power analysis; golden free; bit power consistency;
D O I
10.1145/3199478.3199480
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Processor is the core chip of modern information processing system, which is seriously threatened by hardware Trojan. Side-channel analysis is the most promising method for hardware Trojan detection. However, most existing side-channel based detection approaches require golden chips as reference, which significantly increases the test cost and complexity. In this paper, we present a novel differential bit power analysis method which can detect data activated processor hardware Trojan without the need of golden chips or models. The proposed method exploits the intrinsic consistency of bit powers to detect outliers impacted by hardware Trojans. Data related power model of processor is amended. Differential bit power analysis program is proposed. Experimental measurements are done on field programmable gate array chip with open source 8051 processor and hardware Trojans. The effectiveness of propose method is proved by experiment results.
引用
收藏
页码:134 / 137
页数:4
相关论文
共 11 条
[1]  
[Anonymous], 2014, INTEGRATED CIRCUIT A
[2]  
[Anonymous], WORKSH LARG SCAL EXP
[3]   Hardware Trojan Attacks: Threat Analysis and Countermeasures [J].
Bhunia, Swarup ;
Hsiao, Michael S. ;
Banga, Mainak ;
Narasimhan, Seetharam .
PROCEEDINGS OF THE IEEE, 2014, 102 (08) :1229-1247
[4]   Golden-Free Hardware Trojan Detection with High Sensitivity Under Process Noise [J].
Hoque, Tamzidul ;
Narasimhan, Seetharam ;
Wang, Xinmu ;
Mal-Sarkar, Sanchita ;
Bhunia, Swarup .
JOURNAL OF ELECTRONIC TESTING-THEORY AND APPLICATIONS, 2017, 33 (01) :107-124
[5]   Introduction to differential power analysis [J].
Kocher, Paul ;
Jaffe, Joshua ;
Jun, Benjamin ;
Rohatgi, Pankaj .
JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2011, 1 (01) :5-27
[6]   A comparison of maternal and neonatal outcomes between water immersion during labor and conventional labor and delivery [J].
Liu, Yinglin ;
Liu, Yukun ;
Huang, Xiuzhi ;
Du, Chuying ;
Peng, Jing ;
Huang, Peixian ;
Zhang, Jianping .
BMC PREGNANCY AND CHILDBIRTH, 2014, 14
[7]  
Osborn C. G, 2010, EMBEDDED MICROCONTRO
[8]  
Reece T, 2012, PR IEEE COMP DESIGN, P139, DOI 10.1109/ICCD.2012.6378631
[9]  
Santos J. C. M., 2012, 2012 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFT 2012), P63, DOI 10.1109/DFT.2012.6378201
[10]   Scalable Hardware Trojan Diagnosis [J].
Wei, Sheng ;
Potkonjak, Miodrag .
IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 2012, 20 (06) :1049-1057