Golden-Free Hardware Trojan Detection with High Sensitivity Under Process Noise

被引:43
作者
Hoque, Tamzidul [1 ]
Narasimhan, Seetharam [3 ]
Wang, Xinmu [3 ]
Mal-Sarkar, Sanchita [4 ]
Bhunia, Swarup [2 ]
机构
[1] Univ Florida, Elect & Comp Engn, Gainesville, FL 32611 USA
[2] Univ Florida, Dept Elect & Comp Engn, Gainesville, FL USA
[3] Case Western Reserve Univ, Cleveland, OH 44106 USA
[4] Cleveland State Univ, Cleveland, OH 44115 USA
来源
JOURNAL OF ELECTRONIC TESTING-THEORY AND APPLICATIONS | 2017年 / 33卷 / 01期
基金
美国国家科学基金会;
关键词
Hardware Trojan detection; Sequential Trojans; Side-channel analysis; Self-referencing; Trust in IC;
D O I
10.1007/s10836-016-5632-y
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Malicious modification of integrated circuits in untrusted design house or foundry has emerged as a major security threat. Such modifications, popularly referred to as Hardware Trojans, are difficult to detect during manufacturing test. Sequential hardware Trojans, usually triggered by a sequence of rare events, represent a common and deadly form of Trojans that can be extremely hard to detect using logic testing approaches. Side-channel analysis has emerged as an effective approach for detection of hardware Trojans. However, existing side-channel approaches suffer from increasing process variations, which largely reduce the detection sensitivity and sets a lower limit of the sizes of Trojans detectable. In this paper, we present TeSR, a Temporal Self-Referencing approach that compares the current signature of a chip at two different time windows to isolate the Trojan effect. Since it uses a chip as a reference to itself, the method completely eliminates the effect of process noise and other design marginalities (e.g. capacitive coupling), thus providing high detection sensitivity for Trojans of varying size. Furthermore, unlike most of the existing approaches, TeSR does not require a golden reference chip instance, which may impose a major limitation. Associated test generation, test application, and signature comparison approaches aimed at maximizing Trojan detection sensitivity are also presented. Simulation results for three complex sequential designs and three representative sequential Trojan circuits demonstrate the effectiveness of the approach under large inter- and intra-die process variations. The approach is also validated with current measurement results from several Xilinx Virtex-II FPGA chips.
引用
收藏
页码:107 / 124
页数:18
相关论文
共 49 条
  • [1] Examining the Link Between Issue Attitudes and News Source: The Case of Latinos and Immigration Reform
    Abrajano, Marisa
    Singh, Simran
    [J]. POLITICAL BEHAVIOR, 2009, 31 (01) : 1 - 30
  • [2] [Anonymous], 2007, TRUST INT CIRC TIC
  • [3] [Anonymous], HOST
  • [4] [Anonymous], ISCAS
  • [5] [Anonymous], CHES WORKSH
  • [6] [Anonymous], IEEE T COMPUT AIDED
  • [7] [Anonymous], DATE
  • [8] [Anonymous], HARDWARE TROJANS LES
  • [9] [Anonymous], HOST
  • [10] [Anonymous], IEEE T INF FORENSICS