Creating a Backscattering Side Channel to Enable Detection of Dormant Hardware Trojans

被引:40
作者
Nguyen, Luong N. [1 ]
Cheng, Chia-Lin [1 ]
Prvulovic, Milos [2 ]
Zajic, Alenka [1 ]
机构
[1] Georgia Inst Technol, Sch Elect & Comp Engn, Atlanta, GA 30332 USA
[2] Georgia Inst Technol, Sch Comp Sci, Atlanta, GA 30332 USA
基金
美国国家科学基金会;
关键词
Backscattering side channel; hardware security; hardware Trojan (HT); hardware trust; Trojan detection; THREAT;
D O I
10.1109/TVLSI.2019.2906547
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
This paper describes a new physical side channel, i.e., the backscattering side channel, created by transmitting a signal toward the integrated circuits (ICs), where the internal impedance changes caused by on-chip switching activity modulate the signal that is backscattered (reflected) from the IC. To demonstrate how this new side channel can be used to detect small changes in circuit impedances, we propose a new method for nondestructively detecting hardware Trojans (HTs) from outside the chip. We experimentally confirm, using measurements on one physical instance for training and nine other physical instances for testing, that the new side channel, when combined with an HT detection method, allows detection of a dormant HT in 100% of the HT-afflicted measurements for a number of different HTs while producing no false positives in HT-free measurements. Furthermore, additional experiments are conducted to compare the backscattering-based detection to one that uses the traditional EM-emanation-based side channel. These results show that backscattering-based detection outperforms the EM side channel, confirm that dormant HTs are much more difficult for detection than HTs that have been activated, and show how detection is affected by changing the HT's size and physical location on the IC.
引用
收藏
页码:1561 / 1574
页数:14
相关论文
共 40 条
[1]   Trojan detection using IC fingerprinting [J].
Agrawal, Dakshi ;
Baktir, Selcuk ;
Karakoyunlu, Deniz ;
Rohatgi, Pankaj ;
Sunar, Berk .
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, :296-+
[2]  
[Anonymous], 2002, DIGITAL INTEGRATED C
[3]  
[Anonymous], 2015, P 2015 IEEE INT RELI
[4]  
[Anonymous], 2018, TRUSTHUB
[5]  
Balasch J, 2015, IEEE INT SYMP ELEC, P246, DOI 10.1109/ISEMC.2015.7256167
[6]  
Banga M., 2009, P IEEE INT WORKSH HA, P1
[7]   A region based approach for the identification of hardware Trojans [J].
Banga, Mainak ;
Hsiao, Michael S. .
2008 IEEE INTERNATIONAL WORKSHOP ON HARDWARE-ORIENTED SECURITY AND TRUST, 2008, :40-47
[8]   Temperature Tracking: Toward Robust Run-Time Detection of Hardware Trojans [J].
Bao, Chongxi ;
Forte, Domenic ;
Srivastava, Ankur .
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2015, 34 (10) :1577-1585
[9]   Hardware Trojan Attacks: Threat Analysis and Countermeasures [J].
Bhunia, Swarup ;
Hsiao, Michael S. ;
Banga, Mainak ;
Narasimhan, Seetharam .
PROCEEDINGS OF THE IEEE, 2014, 102 (08) :1229-1247
[10]  
Byeongju Cha, 2012, 2012 21st Asian Test Symposium (ATS 2012). Proceedings, P355, DOI 10.1109/ATS.2012.64